1 // SPDX-License-Identifier: GPL-2.0
3 * hosting IBM Z kernel virtual machines (s390x)
5 * Copyright IBM Corp. 2008, 2018
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
10 * Christian Ehrhardt <ehrhardt@de.ibm.com>
11 * Jason J. Herne <jjherne@us.ibm.com>
14 #define KMSG_COMPONENT "kvm-s390"
15 #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
17 #include <linux/compiler.h>
18 #include <linux/err.h>
20 #include <linux/hrtimer.h>
21 #include <linux/init.h>
22 #include <linux/kvm.h>
23 #include <linux/kvm_host.h>
24 #include <linux/mman.h>
25 #include <linux/module.h>
26 #include <linux/moduleparam.h>
27 #include <linux/random.h>
28 #include <linux/slab.h>
29 #include <linux/timer.h>
30 #include <linux/vmalloc.h>
31 #include <linux/bitmap.h>
32 #include <linux/sched/signal.h>
33 #include <linux/string.h>
35 #include <asm/asm-offsets.h>
36 #include <asm/lowcore.h>
38 #include <asm/pgtable.h>
41 #include <asm/switch_to.h>
44 #include <asm/cpacf.h>
45 #include <asm/timex.h>
50 #define CREATE_TRACE_POINTS
52 #include "trace-s390.h"
54 #define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
56 #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
57 (KVM_MAX_VCPUS + LOCAL_IRQS))
59 #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
60 #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
62 struct kvm_stats_debugfs_item debugfs_entries[] = {
63 { "userspace_handled", VCPU_STAT(exit_userspace) },
64 { "exit_null", VCPU_STAT(exit_null) },
65 { "exit_validity", VCPU_STAT(exit_validity) },
66 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
67 { "exit_external_request", VCPU_STAT(exit_external_request) },
68 { "exit_io_request", VCPU_STAT(exit_io_request) },
69 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
70 { "exit_instruction", VCPU_STAT(exit_instruction) },
71 { "exit_pei", VCPU_STAT(exit_pei) },
72 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
73 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
74 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
75 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
76 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
77 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
78 { "halt_no_poll_steal", VCPU_STAT(halt_no_poll_steal) },
79 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
80 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
81 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
82 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
83 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
84 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
85 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
86 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
87 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
88 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
89 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
90 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
93 { "deliver_program", VCPU_STAT(deliver_program) },
94 { "deliver_io", VCPU_STAT(deliver_io) },
95 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
96 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
97 { "inject_ckc", VCPU_STAT(inject_ckc) },
98 { "inject_cputm", VCPU_STAT(inject_cputm) },
99 { "inject_external_call", VCPU_STAT(inject_external_call) },
100 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
101 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102 { "inject_io", VM_STAT(inject_io) },
103 { "inject_mchk", VCPU_STAT(inject_mchk) },
104 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
105 { "inject_program", VCPU_STAT(inject_program) },
106 { "inject_restart", VCPU_STAT(inject_restart) },
107 { "inject_service_signal", VM_STAT(inject_service_signal) },
108 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111 { "inject_virtio", VM_STAT(inject_virtio) },
112 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
113 { "instruction_gs", VCPU_STAT(instruction_gs) },
114 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
115 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
117 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
118 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
119 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
120 { "instruction_sck", VCPU_STAT(instruction_sck) },
121 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
122 { "instruction_spx", VCPU_STAT(instruction_spx) },
123 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
124 { "instruction_stap", VCPU_STAT(instruction_stap) },
125 { "instruction_iske", VCPU_STAT(instruction_iske) },
126 { "instruction_ri", VCPU_STAT(instruction_ri) },
127 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128 { "instruction_sske", VCPU_STAT(instruction_sske) },
129 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
130 { "instruction_essa", VCPU_STAT(instruction_essa) },
131 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
132 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
133 { "instruction_tb", VCPU_STAT(instruction_tb) },
134 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
135 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
136 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
137 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
138 { "instruction_sie", VCPU_STAT(instruction_sie) },
139 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
140 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
141 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
142 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
143 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
144 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
145 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
146 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
147 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
148 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
149 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
150 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
151 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
152 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
153 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
154 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
155 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
156 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
157 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158 { "diag_9c_ignored", VCPU_STAT(diagnose_9c_ignored) },
159 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
160 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
161 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
162 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
166 struct kvm_s390_tod_clock_ext {
172 /* allow nested virtualization in KVM (if enabled by user space) */
174 module_param(nested, int, S_IRUGO);
175 MODULE_PARM_DESC(nested, "Nested virtualization support");
177 /* allow 1m huge page guest backing, if !nested */
179 module_param(hpage, int, 0444);
180 MODULE_PARM_DESC(hpage, "1m huge page backing support");
182 /* maximum percentage of steal time for polling. >100 is treated like 100 */
183 static u8 halt_poll_max_steal = 10;
184 module_param(halt_poll_max_steal, byte, 0644);
185 MODULE_PARM_DESC(halt_poll_max_steal, "Maximum percentage of steal time to allow polling");
188 * For now we handle at most 16 double words as this is what the s390 base
189 * kernel handles and stores in the prefix page. If we ever need to go beyond
190 * this, this requires changes to code, but the external uapi can stay.
192 #define SIZE_INTERNAL 16
195 * Base feature mask that defines default mask for facilities. Consists of the
196 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
198 static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
200 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
201 * and defines the facilities that can be enabled via a cpu model.
203 static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
205 static unsigned long kvm_s390_fac_size(void)
207 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
208 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
209 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
210 sizeof(S390_lowcore.stfle_fac_list));
212 return SIZE_INTERNAL;
215 /* available cpu features supported by kvm */
216 static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
217 /* available subfunctions indicated via query / "test bit" */
218 static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
220 static struct gmap_notifier gmap_notifier;
221 static struct gmap_notifier vsie_gmap_notifier;
222 debug_info_t *kvm_s390_dbf;
224 /* Section: not file related */
225 int kvm_arch_hardware_enable(void)
227 /* every s390 is virtualization enabled ;-) */
231 int kvm_arch_check_processor_compat(void)
236 static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
239 static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
244 * The TOD jumps by delta, we have to compensate this by adding
245 * -delta to the epoch.
249 /* sign-extension - we're adding to signed values below */
254 if (scb->ecd & ECD_MEF) {
255 scb->epdx += delta_idx;
256 if (scb->epoch < delta)
262 * This callback is executed during stop_machine(). All CPUs are therefore
263 * temporarily stopped. In order not to change guest behavior, we have to
264 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
265 * so a CPU won't be stopped while calculating with the epoch.
267 static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
271 struct kvm_vcpu *vcpu;
273 unsigned long long *delta = v;
275 list_for_each_entry(kvm, &vm_list, vm_list) {
276 kvm_for_each_vcpu(i, vcpu, kvm) {
277 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
279 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
280 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
282 if (vcpu->arch.cputm_enabled)
283 vcpu->arch.cputm_start += *delta;
284 if (vcpu->arch.vsie_block)
285 kvm_clock_sync_scb(vcpu->arch.vsie_block,
292 static struct notifier_block kvm_clock_notifier = {
293 .notifier_call = kvm_clock_sync,
296 int kvm_arch_hardware_setup(void)
298 gmap_notifier.notifier_call = kvm_gmap_notifier;
299 gmap_register_pte_notifier(&gmap_notifier);
300 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
301 gmap_register_pte_notifier(&vsie_gmap_notifier);
302 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
303 &kvm_clock_notifier);
307 void kvm_arch_hardware_unsetup(void)
309 gmap_unregister_pte_notifier(&gmap_notifier);
310 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
311 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
312 &kvm_clock_notifier);
315 static void allow_cpu_feat(unsigned long nr)
317 set_bit_inv(nr, kvm_s390_available_cpu_feat);
320 static inline int plo_test_bit(unsigned char nr)
322 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
326 /* Parameter registers are ignored for "test bit" */
336 static __always_inline void __insn32_query(unsigned int opcode, u8 *query)
338 register unsigned long r0 asm("0") = 0; /* query function */
339 register unsigned long r1 asm("1") = (unsigned long) query;
342 /* Parameter regs are ignored */
343 " .insn rrf,%[opc] << 16,2,4,6,0\n"
345 : "d" (r0), "a" (r1), [opc] "i" (opcode)
349 #define INSN_SORTL 0xb938
350 #define INSN_DFLTCC 0xb939
352 static void kvm_s390_cpu_feat_init(void)
356 for (i = 0; i < 256; ++i) {
358 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
361 if (test_facility(28)) /* TOD-clock steering */
362 ptff(kvm_s390_available_subfunc.ptff,
363 sizeof(kvm_s390_available_subfunc.ptff),
366 if (test_facility(17)) { /* MSA */
367 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
368 kvm_s390_available_subfunc.kmac);
369 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
370 kvm_s390_available_subfunc.kmc);
371 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
372 kvm_s390_available_subfunc.km);
373 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
374 kvm_s390_available_subfunc.kimd);
375 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
376 kvm_s390_available_subfunc.klmd);
378 if (test_facility(76)) /* MSA3 */
379 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
380 kvm_s390_available_subfunc.pckmo);
381 if (test_facility(77)) { /* MSA4 */
382 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
383 kvm_s390_available_subfunc.kmctr);
384 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
385 kvm_s390_available_subfunc.kmf);
386 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
387 kvm_s390_available_subfunc.kmo);
388 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
389 kvm_s390_available_subfunc.pcc);
391 if (test_facility(57)) /* MSA5 */
392 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
393 kvm_s390_available_subfunc.ppno);
395 if (test_facility(146)) /* MSA8 */
396 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
397 kvm_s390_available_subfunc.kma);
399 if (test_facility(155)) /* MSA9 */
400 __cpacf_query(CPACF_KDSA, (cpacf_mask_t *)
401 kvm_s390_available_subfunc.kdsa);
403 if (test_facility(150)) /* SORTL */
404 __insn32_query(INSN_SORTL, kvm_s390_available_subfunc.sortl);
406 if (test_facility(151)) /* DFLTCC */
407 __insn32_query(INSN_DFLTCC, kvm_s390_available_subfunc.dfltcc);
409 if (MACHINE_HAS_ESOP)
410 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
412 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
413 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
415 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
416 !test_facility(3) || !nested)
418 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
419 if (sclp.has_64bscao)
420 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
422 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
424 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
426 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
428 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
430 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
432 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
434 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
436 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
437 * all skey handling functions read/set the skey from the PGSTE
438 * instead of the real storage key.
440 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
441 * pages being detected as preserved although they are resident.
443 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
444 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
446 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
447 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
448 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
450 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
451 * cannot easily shadow the SCA because of the ipte lock.
455 int kvm_arch_init(void *opaque)
459 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
463 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view))
466 kvm_s390_cpu_feat_init();
468 /* Register floating interrupt controller interface. */
469 rc = kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
471 pr_err("A FLIC registration call failed with rc=%d\n", rc);
475 rc = kvm_s390_gib_init(GAL_ISC);
486 void kvm_arch_exit(void)
488 kvm_s390_gib_destroy();
489 debug_unregister(kvm_s390_dbf);
492 /* Section: device related */
493 long kvm_arch_dev_ioctl(struct file *filp,
494 unsigned int ioctl, unsigned long arg)
496 if (ioctl == KVM_S390_ENABLE_SIE)
497 return s390_enable_sie();
501 int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
506 case KVM_CAP_S390_PSW:
507 case KVM_CAP_S390_GMAP:
508 case KVM_CAP_SYNC_MMU:
509 #ifdef CONFIG_KVM_S390_UCONTROL
510 case KVM_CAP_S390_UCONTROL:
512 case KVM_CAP_ASYNC_PF:
513 case KVM_CAP_SYNC_REGS:
514 case KVM_CAP_ONE_REG:
515 case KVM_CAP_ENABLE_CAP:
516 case KVM_CAP_S390_CSS_SUPPORT:
517 case KVM_CAP_IOEVENTFD:
518 case KVM_CAP_DEVICE_CTRL:
519 case KVM_CAP_S390_IRQCHIP:
520 case KVM_CAP_VM_ATTRIBUTES:
521 case KVM_CAP_MP_STATE:
522 case KVM_CAP_IMMEDIATE_EXIT:
523 case KVM_CAP_S390_INJECT_IRQ:
524 case KVM_CAP_S390_USER_SIGP:
525 case KVM_CAP_S390_USER_STSI:
526 case KVM_CAP_S390_SKEYS:
527 case KVM_CAP_S390_IRQ_STATE:
528 case KVM_CAP_S390_USER_INSTR0:
529 case KVM_CAP_S390_CMMA_MIGRATION:
530 case KVM_CAP_S390_AIS:
531 case KVM_CAP_S390_AIS_MIGRATION:
534 case KVM_CAP_S390_HPAGE_1M:
536 if (hpage && !kvm_is_ucontrol(kvm))
539 case KVM_CAP_S390_MEM_OP:
542 case KVM_CAP_NR_VCPUS:
543 case KVM_CAP_MAX_VCPUS:
544 case KVM_CAP_MAX_VCPU_ID:
545 r = KVM_S390_BSCA_CPU_SLOTS;
546 if (!kvm_s390_use_sca_entries())
548 else if (sclp.has_esca && sclp.has_64bscao)
549 r = KVM_S390_ESCA_CPU_SLOTS;
551 case KVM_CAP_S390_COW:
552 r = MACHINE_HAS_ESOP;
554 case KVM_CAP_S390_VECTOR_REGISTERS:
557 case KVM_CAP_S390_RI:
558 r = test_facility(64);
560 case KVM_CAP_S390_GS:
561 r = test_facility(133);
563 case KVM_CAP_S390_BPB:
564 r = test_facility(82);
572 static void kvm_s390_sync_dirty_log(struct kvm *kvm,
573 struct kvm_memory_slot *memslot)
576 gfn_t cur_gfn, last_gfn;
577 unsigned long gaddr, vmaddr;
578 struct gmap *gmap = kvm->arch.gmap;
579 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
581 /* Loop over all guest segments */
582 cur_gfn = memslot->base_gfn;
583 last_gfn = memslot->base_gfn + memslot->npages;
584 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
585 gaddr = gfn_to_gpa(cur_gfn);
586 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
587 if (kvm_is_error_hva(vmaddr))
590 bitmap_zero(bitmap, _PAGE_ENTRIES);
591 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
592 for (i = 0; i < _PAGE_ENTRIES; i++) {
593 if (test_bit(i, bitmap))
594 mark_page_dirty(kvm, cur_gfn + i);
597 if (fatal_signal_pending(current))
603 /* Section: vm related */
604 static void sca_del_vcpu(struct kvm_vcpu *vcpu);
607 * Get (and clear) the dirty memory log for a memory slot.
609 int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
610 struct kvm_dirty_log *log)
614 struct kvm_memslots *slots;
615 struct kvm_memory_slot *memslot;
618 if (kvm_is_ucontrol(kvm))
621 mutex_lock(&kvm->slots_lock);
624 if (log->slot >= KVM_USER_MEM_SLOTS)
627 slots = kvm_memslots(kvm);
628 memslot = id_to_memslot(slots, log->slot);
630 if (!memslot->dirty_bitmap)
633 kvm_s390_sync_dirty_log(kvm, memslot);
634 r = kvm_get_dirty_log(kvm, log, &is_dirty);
638 /* Clear the dirty log */
640 n = kvm_dirty_bitmap_bytes(memslot);
641 memset(memslot->dirty_bitmap, 0, n);
645 mutex_unlock(&kvm->slots_lock);
649 static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
652 struct kvm_vcpu *vcpu;
654 kvm_for_each_vcpu(i, vcpu, kvm) {
655 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
659 int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
667 case KVM_CAP_S390_IRQCHIP:
668 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
669 kvm->arch.use_irqchip = 1;
672 case KVM_CAP_S390_USER_SIGP:
673 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
674 kvm->arch.user_sigp = 1;
677 case KVM_CAP_S390_VECTOR_REGISTERS:
678 mutex_lock(&kvm->lock);
679 if (kvm->created_vcpus) {
681 } else if (MACHINE_HAS_VX) {
682 set_kvm_facility(kvm->arch.model.fac_mask, 129);
683 set_kvm_facility(kvm->arch.model.fac_list, 129);
684 if (test_facility(134)) {
685 set_kvm_facility(kvm->arch.model.fac_mask, 134);
686 set_kvm_facility(kvm->arch.model.fac_list, 134);
688 if (test_facility(135)) {
689 set_kvm_facility(kvm->arch.model.fac_mask, 135);
690 set_kvm_facility(kvm->arch.model.fac_list, 135);
692 if (test_facility(148)) {
693 set_kvm_facility(kvm->arch.model.fac_mask, 148);
694 set_kvm_facility(kvm->arch.model.fac_list, 148);
696 if (test_facility(152)) {
697 set_kvm_facility(kvm->arch.model.fac_mask, 152);
698 set_kvm_facility(kvm->arch.model.fac_list, 152);
703 mutex_unlock(&kvm->lock);
704 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
705 r ? "(not available)" : "(success)");
707 case KVM_CAP_S390_RI:
709 mutex_lock(&kvm->lock);
710 if (kvm->created_vcpus) {
712 } else if (test_facility(64)) {
713 set_kvm_facility(kvm->arch.model.fac_mask, 64);
714 set_kvm_facility(kvm->arch.model.fac_list, 64);
717 mutex_unlock(&kvm->lock);
718 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
719 r ? "(not available)" : "(success)");
721 case KVM_CAP_S390_AIS:
722 mutex_lock(&kvm->lock);
723 if (kvm->created_vcpus) {
726 set_kvm_facility(kvm->arch.model.fac_mask, 72);
727 set_kvm_facility(kvm->arch.model.fac_list, 72);
730 mutex_unlock(&kvm->lock);
731 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
732 r ? "(not available)" : "(success)");
734 case KVM_CAP_S390_GS:
736 mutex_lock(&kvm->lock);
737 if (kvm->created_vcpus) {
739 } else if (test_facility(133)) {
740 set_kvm_facility(kvm->arch.model.fac_mask, 133);
741 set_kvm_facility(kvm->arch.model.fac_list, 133);
744 mutex_unlock(&kvm->lock);
745 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
746 r ? "(not available)" : "(success)");
748 case KVM_CAP_S390_HPAGE_1M:
749 mutex_lock(&kvm->lock);
750 if (kvm->created_vcpus)
752 else if (!hpage || kvm->arch.use_cmma || kvm_is_ucontrol(kvm))
756 down_write(&kvm->mm->mmap_sem);
757 kvm->mm->context.allow_gmap_hpage_1m = 1;
758 up_write(&kvm->mm->mmap_sem);
760 * We might have to create fake 4k page
761 * tables. To avoid that the hardware works on
762 * stale PGSTEs, we emulate these instructions.
764 kvm->arch.use_skf = 0;
765 kvm->arch.use_pfmfi = 0;
767 mutex_unlock(&kvm->lock);
768 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
769 r ? "(not available)" : "(success)");
771 case KVM_CAP_S390_USER_STSI:
772 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
773 kvm->arch.user_stsi = 1;
776 case KVM_CAP_S390_USER_INSTR0:
777 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
778 kvm->arch.user_instr0 = 1;
779 icpt_operexc_on_all_vcpus(kvm);
789 static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
793 switch (attr->attr) {
794 case KVM_S390_VM_MEM_LIMIT_SIZE:
796 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
797 kvm->arch.mem_limit);
798 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
808 static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
812 switch (attr->attr) {
813 case KVM_S390_VM_MEM_ENABLE_CMMA:
818 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
819 mutex_lock(&kvm->lock);
820 if (kvm->created_vcpus)
822 else if (kvm->mm->context.allow_gmap_hpage_1m)
825 kvm->arch.use_cmma = 1;
826 /* Not compatible with cmma. */
827 kvm->arch.use_pfmfi = 0;
830 mutex_unlock(&kvm->lock);
832 case KVM_S390_VM_MEM_CLR_CMMA:
837 if (!kvm->arch.use_cmma)
840 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
841 mutex_lock(&kvm->lock);
842 idx = srcu_read_lock(&kvm->srcu);
843 s390_reset_cmma(kvm->arch.gmap->mm);
844 srcu_read_unlock(&kvm->srcu, idx);
845 mutex_unlock(&kvm->lock);
848 case KVM_S390_VM_MEM_LIMIT_SIZE: {
849 unsigned long new_limit;
851 if (kvm_is_ucontrol(kvm))
854 if (get_user(new_limit, (u64 __user *)attr->addr))
857 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
858 new_limit > kvm->arch.mem_limit)
864 /* gmap_create takes last usable address */
865 if (new_limit != KVM_S390_NO_MEM_LIMIT)
869 mutex_lock(&kvm->lock);
870 if (!kvm->created_vcpus) {
871 /* gmap_create will round the limit up */
872 struct gmap *new = gmap_create(current->mm, new_limit);
877 gmap_remove(kvm->arch.gmap);
879 kvm->arch.gmap = new;
883 mutex_unlock(&kvm->lock);
884 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
885 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
886 (void *) kvm->arch.gmap->asce);
896 static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
898 void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
900 struct kvm_vcpu *vcpu;
903 kvm_s390_vcpu_block_all(kvm);
905 kvm_for_each_vcpu(i, vcpu, kvm) {
906 kvm_s390_vcpu_crypto_setup(vcpu);
907 /* recreate the shadow crycb by leaving the VSIE handler */
908 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
911 kvm_s390_vcpu_unblock_all(kvm);
914 static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
916 mutex_lock(&kvm->lock);
917 switch (attr->attr) {
918 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
919 if (!test_kvm_facility(kvm, 76)) {
920 mutex_unlock(&kvm->lock);
924 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
925 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
926 kvm->arch.crypto.aes_kw = 1;
927 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
929 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
930 if (!test_kvm_facility(kvm, 76)) {
931 mutex_unlock(&kvm->lock);
935 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
936 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
937 kvm->arch.crypto.dea_kw = 1;
938 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
940 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
941 if (!test_kvm_facility(kvm, 76)) {
942 mutex_unlock(&kvm->lock);
945 kvm->arch.crypto.aes_kw = 0;
946 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
947 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
948 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
950 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
951 if (!test_kvm_facility(kvm, 76)) {
952 mutex_unlock(&kvm->lock);
955 kvm->arch.crypto.dea_kw = 0;
956 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
957 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
958 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
960 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
961 if (!ap_instructions_available()) {
962 mutex_unlock(&kvm->lock);
965 kvm->arch.crypto.apie = 1;
967 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
968 if (!ap_instructions_available()) {
969 mutex_unlock(&kvm->lock);
972 kvm->arch.crypto.apie = 0;
975 mutex_unlock(&kvm->lock);
979 kvm_s390_vcpu_crypto_reset_all(kvm);
980 mutex_unlock(&kvm->lock);
984 static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
987 struct kvm_vcpu *vcpu;
989 kvm_for_each_vcpu(cx, vcpu, kvm)
990 kvm_s390_sync_request(req, vcpu);
994 * Must be called with kvm->srcu held to avoid races on memslots, and with
995 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
997 static int kvm_s390_vm_start_migration(struct kvm *kvm)
999 struct kvm_memory_slot *ms;
1000 struct kvm_memslots *slots;
1001 unsigned long ram_pages = 0;
1004 /* migration mode already enabled */
1005 if (kvm->arch.migration_mode)
1007 slots = kvm_memslots(kvm);
1008 if (!slots || !slots->used_slots)
1011 if (!kvm->arch.use_cmma) {
1012 kvm->arch.migration_mode = 1;
1015 /* mark all the pages in active slots as dirty */
1016 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
1017 ms = slots->memslots + slotnr;
1018 if (!ms->dirty_bitmap)
1021 * The second half of the bitmap is only used on x86,
1022 * and would be wasted otherwise, so we put it to good
1023 * use here to keep track of the state of the storage
1026 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
1027 ram_pages += ms->npages;
1029 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
1030 kvm->arch.migration_mode = 1;
1031 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
1036 * Must be called with kvm->slots_lock to avoid races with ourselves and
1037 * kvm_s390_vm_start_migration.
1039 static int kvm_s390_vm_stop_migration(struct kvm *kvm)
1041 /* migration mode already disabled */
1042 if (!kvm->arch.migration_mode)
1044 kvm->arch.migration_mode = 0;
1045 if (kvm->arch.use_cmma)
1046 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
1050 static int kvm_s390_vm_set_migration(struct kvm *kvm,
1051 struct kvm_device_attr *attr)
1055 mutex_lock(&kvm->slots_lock);
1056 switch (attr->attr) {
1057 case KVM_S390_VM_MIGRATION_START:
1058 res = kvm_s390_vm_start_migration(kvm);
1060 case KVM_S390_VM_MIGRATION_STOP:
1061 res = kvm_s390_vm_stop_migration(kvm);
1066 mutex_unlock(&kvm->slots_lock);
1071 static int kvm_s390_vm_get_migration(struct kvm *kvm,
1072 struct kvm_device_attr *attr)
1074 u64 mig = kvm->arch.migration_mode;
1076 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
1079 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
1084 static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1086 struct kvm_s390_vm_tod_clock gtod;
1088 if (copy_from_user(>od, (void __user *)attr->addr, sizeof(gtod)))
1091 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
1093 kvm_s390_set_tod_clock(kvm, >od);
1095 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1096 gtod.epoch_idx, gtod.tod);
1101 static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1105 if (copy_from_user(>od_high, (void __user *)attr->addr,
1111 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
1116 static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1118 struct kvm_s390_vm_tod_clock gtod = { 0 };
1120 if (copy_from_user(>od.tod, (void __user *)attr->addr,
1124 kvm_s390_set_tod_clock(kvm, >od);
1125 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
1129 static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1136 switch (attr->attr) {
1137 case KVM_S390_VM_TOD_EXT:
1138 ret = kvm_s390_set_tod_ext(kvm, attr);
1140 case KVM_S390_VM_TOD_HIGH:
1141 ret = kvm_s390_set_tod_high(kvm, attr);
1143 case KVM_S390_VM_TOD_LOW:
1144 ret = kvm_s390_set_tod_low(kvm, attr);
1153 static void kvm_s390_get_tod_clock(struct kvm *kvm,
1154 struct kvm_s390_vm_tod_clock *gtod)
1156 struct kvm_s390_tod_clock_ext htod;
1160 get_tod_clock_ext((char *)&htod);
1162 gtod->tod = htod.tod + kvm->arch.epoch;
1163 gtod->epoch_idx = 0;
1164 if (test_kvm_facility(kvm, 139)) {
1165 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1166 if (gtod->tod < htod.tod)
1167 gtod->epoch_idx += 1;
1173 static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1175 struct kvm_s390_vm_tod_clock gtod;
1177 memset(>od, 0, sizeof(gtod));
1178 kvm_s390_get_tod_clock(kvm, >od);
1179 if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod)))
1182 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1183 gtod.epoch_idx, gtod.tod);
1187 static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1191 if (copy_to_user((void __user *)attr->addr, >od_high,
1194 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
1199 static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1203 gtod = kvm_s390_get_tod_clock_fast(kvm);
1204 if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod)))
1206 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
1211 static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1218 switch (attr->attr) {
1219 case KVM_S390_VM_TOD_EXT:
1220 ret = kvm_s390_get_tod_ext(kvm, attr);
1222 case KVM_S390_VM_TOD_HIGH:
1223 ret = kvm_s390_get_tod_high(kvm, attr);
1225 case KVM_S390_VM_TOD_LOW:
1226 ret = kvm_s390_get_tod_low(kvm, attr);
1235 static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1237 struct kvm_s390_vm_cpu_processor *proc;
1238 u16 lowest_ibc, unblocked_ibc;
1241 mutex_lock(&kvm->lock);
1242 if (kvm->created_vcpus) {
1246 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1251 if (!copy_from_user(proc, (void __user *)attr->addr,
1253 kvm->arch.model.cpuid = proc->cpuid;
1254 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1255 unblocked_ibc = sclp.ibc & 0xfff;
1256 if (lowest_ibc && proc->ibc) {
1257 if (proc->ibc > unblocked_ibc)
1258 kvm->arch.model.ibc = unblocked_ibc;
1259 else if (proc->ibc < lowest_ibc)
1260 kvm->arch.model.ibc = lowest_ibc;
1262 kvm->arch.model.ibc = proc->ibc;
1264 memcpy(kvm->arch.model.fac_list, proc->fac_list,
1265 S390_ARCH_FAC_LIST_SIZE_BYTE);
1266 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1267 kvm->arch.model.ibc,
1268 kvm->arch.model.cpuid);
1269 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1270 kvm->arch.model.fac_list[0],
1271 kvm->arch.model.fac_list[1],
1272 kvm->arch.model.fac_list[2]);
1277 mutex_unlock(&kvm->lock);
1281 static int kvm_s390_set_processor_feat(struct kvm *kvm,
1282 struct kvm_device_attr *attr)
1284 struct kvm_s390_vm_cpu_feat data;
1286 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1288 if (!bitmap_subset((unsigned long *) data.feat,
1289 kvm_s390_available_cpu_feat,
1290 KVM_S390_VM_CPU_FEAT_NR_BITS))
1293 mutex_lock(&kvm->lock);
1294 if (kvm->created_vcpus) {
1295 mutex_unlock(&kvm->lock);
1298 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1299 KVM_S390_VM_CPU_FEAT_NR_BITS);
1300 mutex_unlock(&kvm->lock);
1301 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1308 static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1309 struct kvm_device_attr *attr)
1311 mutex_lock(&kvm->lock);
1312 if (kvm->created_vcpus) {
1313 mutex_unlock(&kvm->lock);
1317 if (copy_from_user(&kvm->arch.model.subfuncs, (void __user *)attr->addr,
1318 sizeof(struct kvm_s390_vm_cpu_subfunc))) {
1319 mutex_unlock(&kvm->lock);
1322 mutex_unlock(&kvm->lock);
1324 VM_EVENT(kvm, 3, "SET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1325 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1326 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1327 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1328 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1329 VM_EVENT(kvm, 3, "SET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1330 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1331 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1332 VM_EVENT(kvm, 3, "SET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1333 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1334 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1335 VM_EVENT(kvm, 3, "SET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1336 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1337 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1338 VM_EVENT(kvm, 3, "SET: guest KM subfunc 0x%16.16lx.%16.16lx",
1339 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1340 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1341 VM_EVENT(kvm, 3, "SET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1342 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1343 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1344 VM_EVENT(kvm, 3, "SET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1345 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1346 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1347 VM_EVENT(kvm, 3, "SET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1348 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1349 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1350 VM_EVENT(kvm, 3, "SET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1351 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1352 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1353 VM_EVENT(kvm, 3, "SET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1354 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1355 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1356 VM_EVENT(kvm, 3, "SET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1357 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1358 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1359 VM_EVENT(kvm, 3, "SET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1360 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1361 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1362 VM_EVENT(kvm, 3, "SET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1363 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1364 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1365 VM_EVENT(kvm, 3, "SET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1366 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1367 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
1368 VM_EVENT(kvm, 3, "SET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1369 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1370 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
1371 VM_EVENT(kvm, 3, "SET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1372 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1373 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1374 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1375 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
1376 VM_EVENT(kvm, 3, "SET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1377 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1378 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1379 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1380 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
1385 static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1389 switch (attr->attr) {
1390 case KVM_S390_VM_CPU_PROCESSOR:
1391 ret = kvm_s390_set_processor(kvm, attr);
1393 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1394 ret = kvm_s390_set_processor_feat(kvm, attr);
1396 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1397 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1403 static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1405 struct kvm_s390_vm_cpu_processor *proc;
1408 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1413 proc->cpuid = kvm->arch.model.cpuid;
1414 proc->ibc = kvm->arch.model.ibc;
1415 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1416 S390_ARCH_FAC_LIST_SIZE_BYTE);
1417 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1418 kvm->arch.model.ibc,
1419 kvm->arch.model.cpuid);
1420 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1421 kvm->arch.model.fac_list[0],
1422 kvm->arch.model.fac_list[1],
1423 kvm->arch.model.fac_list[2]);
1424 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1431 static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1433 struct kvm_s390_vm_cpu_machine *mach;
1436 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1441 get_cpu_id((struct cpuid *) &mach->cpuid);
1442 mach->ibc = sclp.ibc;
1443 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
1444 S390_ARCH_FAC_LIST_SIZE_BYTE);
1445 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
1446 sizeof(S390_lowcore.stfle_fac_list));
1447 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1448 kvm->arch.model.ibc,
1449 kvm->arch.model.cpuid);
1450 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1454 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1458 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1465 static int kvm_s390_get_processor_feat(struct kvm *kvm,
1466 struct kvm_device_attr *attr)
1468 struct kvm_s390_vm_cpu_feat data;
1470 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1471 KVM_S390_VM_CPU_FEAT_NR_BITS);
1472 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1474 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1481 static int kvm_s390_get_machine_feat(struct kvm *kvm,
1482 struct kvm_device_attr *attr)
1484 struct kvm_s390_vm_cpu_feat data;
1486 bitmap_copy((unsigned long *) data.feat,
1487 kvm_s390_available_cpu_feat,
1488 KVM_S390_VM_CPU_FEAT_NR_BITS);
1489 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1491 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1498 static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1499 struct kvm_device_attr *attr)
1501 if (copy_to_user((void __user *)attr->addr, &kvm->arch.model.subfuncs,
1502 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1505 VM_EVENT(kvm, 3, "GET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1506 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1507 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1508 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1509 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1510 VM_EVENT(kvm, 3, "GET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1511 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1512 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1513 VM_EVENT(kvm, 3, "GET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1514 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1515 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1516 VM_EVENT(kvm, 3, "GET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1517 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1518 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1519 VM_EVENT(kvm, 3, "GET: guest KM subfunc 0x%16.16lx.%16.16lx",
1520 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1521 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1522 VM_EVENT(kvm, 3, "GET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1523 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1524 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1525 VM_EVENT(kvm, 3, "GET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1526 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1527 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1528 VM_EVENT(kvm, 3, "GET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1529 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1530 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1531 VM_EVENT(kvm, 3, "GET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1532 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1533 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1534 VM_EVENT(kvm, 3, "GET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1535 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1536 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1537 VM_EVENT(kvm, 3, "GET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1538 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1539 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1540 VM_EVENT(kvm, 3, "GET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1541 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1542 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1543 VM_EVENT(kvm, 3, "GET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1544 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1545 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1546 VM_EVENT(kvm, 3, "GET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1547 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1548 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
1549 VM_EVENT(kvm, 3, "GET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1550 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1551 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
1552 VM_EVENT(kvm, 3, "GET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1553 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1554 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1555 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1556 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
1557 VM_EVENT(kvm, 3, "GET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1558 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1559 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1560 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1561 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
1566 static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1567 struct kvm_device_attr *attr)
1569 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1570 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1573 VM_EVENT(kvm, 3, "GET: host PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1574 ((unsigned long *) &kvm_s390_available_subfunc.plo)[0],
1575 ((unsigned long *) &kvm_s390_available_subfunc.plo)[1],
1576 ((unsigned long *) &kvm_s390_available_subfunc.plo)[2],
1577 ((unsigned long *) &kvm_s390_available_subfunc.plo)[3]);
1578 VM_EVENT(kvm, 3, "GET: host PTFF subfunc 0x%16.16lx.%16.16lx",
1579 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[0],
1580 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[1]);
1581 VM_EVENT(kvm, 3, "GET: host KMAC subfunc 0x%16.16lx.%16.16lx",
1582 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[0],
1583 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[1]);
1584 VM_EVENT(kvm, 3, "GET: host KMC subfunc 0x%16.16lx.%16.16lx",
1585 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[0],
1586 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[1]);
1587 VM_EVENT(kvm, 3, "GET: host KM subfunc 0x%16.16lx.%16.16lx",
1588 ((unsigned long *) &kvm_s390_available_subfunc.km)[0],
1589 ((unsigned long *) &kvm_s390_available_subfunc.km)[1]);
1590 VM_EVENT(kvm, 3, "GET: host KIMD subfunc 0x%16.16lx.%16.16lx",
1591 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[0],
1592 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[1]);
1593 VM_EVENT(kvm, 3, "GET: host KLMD subfunc 0x%16.16lx.%16.16lx",
1594 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[0],
1595 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[1]);
1596 VM_EVENT(kvm, 3, "GET: host PCKMO subfunc 0x%16.16lx.%16.16lx",
1597 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[0],
1598 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[1]);
1599 VM_EVENT(kvm, 3, "GET: host KMCTR subfunc 0x%16.16lx.%16.16lx",
1600 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[0],
1601 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[1]);
1602 VM_EVENT(kvm, 3, "GET: host KMF subfunc 0x%16.16lx.%16.16lx",
1603 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[0],
1604 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[1]);
1605 VM_EVENT(kvm, 3, "GET: host KMO subfunc 0x%16.16lx.%16.16lx",
1606 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[0],
1607 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[1]);
1608 VM_EVENT(kvm, 3, "GET: host PCC subfunc 0x%16.16lx.%16.16lx",
1609 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[0],
1610 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[1]);
1611 VM_EVENT(kvm, 3, "GET: host PPNO subfunc 0x%16.16lx.%16.16lx",
1612 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[0],
1613 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[1]);
1614 VM_EVENT(kvm, 3, "GET: host KMA subfunc 0x%16.16lx.%16.16lx",
1615 ((unsigned long *) &kvm_s390_available_subfunc.kma)[0],
1616 ((unsigned long *) &kvm_s390_available_subfunc.kma)[1]);
1617 VM_EVENT(kvm, 3, "GET: host KDSA subfunc 0x%16.16lx.%16.16lx",
1618 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[0],
1619 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[1]);
1620 VM_EVENT(kvm, 3, "GET: host SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1621 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[0],
1622 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[1],
1623 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[2],
1624 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[3]);
1625 VM_EVENT(kvm, 3, "GET: host DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1626 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[0],
1627 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[1],
1628 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[2],
1629 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[3]);
1634 static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1638 switch (attr->attr) {
1639 case KVM_S390_VM_CPU_PROCESSOR:
1640 ret = kvm_s390_get_processor(kvm, attr);
1642 case KVM_S390_VM_CPU_MACHINE:
1643 ret = kvm_s390_get_machine(kvm, attr);
1645 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1646 ret = kvm_s390_get_processor_feat(kvm, attr);
1648 case KVM_S390_VM_CPU_MACHINE_FEAT:
1649 ret = kvm_s390_get_machine_feat(kvm, attr);
1651 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1652 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1654 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1655 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1661 static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1665 switch (attr->group) {
1666 case KVM_S390_VM_MEM_CTRL:
1667 ret = kvm_s390_set_mem_control(kvm, attr);
1669 case KVM_S390_VM_TOD:
1670 ret = kvm_s390_set_tod(kvm, attr);
1672 case KVM_S390_VM_CPU_MODEL:
1673 ret = kvm_s390_set_cpu_model(kvm, attr);
1675 case KVM_S390_VM_CRYPTO:
1676 ret = kvm_s390_vm_set_crypto(kvm, attr);
1678 case KVM_S390_VM_MIGRATION:
1679 ret = kvm_s390_vm_set_migration(kvm, attr);
1689 static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1693 switch (attr->group) {
1694 case KVM_S390_VM_MEM_CTRL:
1695 ret = kvm_s390_get_mem_control(kvm, attr);
1697 case KVM_S390_VM_TOD:
1698 ret = kvm_s390_get_tod(kvm, attr);
1700 case KVM_S390_VM_CPU_MODEL:
1701 ret = kvm_s390_get_cpu_model(kvm, attr);
1703 case KVM_S390_VM_MIGRATION:
1704 ret = kvm_s390_vm_get_migration(kvm, attr);
1714 static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1718 switch (attr->group) {
1719 case KVM_S390_VM_MEM_CTRL:
1720 switch (attr->attr) {
1721 case KVM_S390_VM_MEM_ENABLE_CMMA:
1722 case KVM_S390_VM_MEM_CLR_CMMA:
1723 ret = sclp.has_cmma ? 0 : -ENXIO;
1725 case KVM_S390_VM_MEM_LIMIT_SIZE:
1733 case KVM_S390_VM_TOD:
1734 switch (attr->attr) {
1735 case KVM_S390_VM_TOD_LOW:
1736 case KVM_S390_VM_TOD_HIGH:
1744 case KVM_S390_VM_CPU_MODEL:
1745 switch (attr->attr) {
1746 case KVM_S390_VM_CPU_PROCESSOR:
1747 case KVM_S390_VM_CPU_MACHINE:
1748 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1749 case KVM_S390_VM_CPU_MACHINE_FEAT:
1750 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1751 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1759 case KVM_S390_VM_CRYPTO:
1760 switch (attr->attr) {
1761 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1762 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1763 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1764 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1767 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
1768 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
1769 ret = ap_instructions_available() ? 0 : -ENXIO;
1776 case KVM_S390_VM_MIGRATION:
1787 static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1791 int srcu_idx, i, r = 0;
1793 if (args->flags != 0)
1796 /* Is this guest using storage keys? */
1797 if (!mm_uses_skeys(current->mm))
1798 return KVM_S390_GET_SKEYS_NONE;
1800 /* Enforce sane limit on memory allocation */
1801 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1804 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
1808 down_read(¤t->mm->mmap_sem);
1809 srcu_idx = srcu_read_lock(&kvm->srcu);
1810 for (i = 0; i < args->count; i++) {
1811 hva = gfn_to_hva(kvm, args->start_gfn + i);
1812 if (kvm_is_error_hva(hva)) {
1817 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1821 srcu_read_unlock(&kvm->srcu, srcu_idx);
1822 up_read(¤t->mm->mmap_sem);
1825 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1826 sizeof(uint8_t) * args->count);
1835 static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1839 int srcu_idx, i, r = 0;
1842 if (args->flags != 0)
1845 /* Enforce sane limit on memory allocation */
1846 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1849 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
1853 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1854 sizeof(uint8_t) * args->count);
1860 /* Enable storage key handling for the guest */
1861 r = s390_enable_skey();
1866 down_read(¤t->mm->mmap_sem);
1867 srcu_idx = srcu_read_lock(&kvm->srcu);
1868 while (i < args->count) {
1870 hva = gfn_to_hva(kvm, args->start_gfn + i);
1871 if (kvm_is_error_hva(hva)) {
1876 /* Lowest order bit is reserved */
1877 if (keys[i] & 0x01) {
1882 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
1884 r = fixup_user_fault(current, current->mm, hva,
1885 FAULT_FLAG_WRITE, &unlocked);
1892 srcu_read_unlock(&kvm->srcu, srcu_idx);
1893 up_read(¤t->mm->mmap_sem);
1900 * Base address and length must be sent at the start of each block, therefore
1901 * it's cheaper to send some clean data, as long as it's less than the size of
1904 #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1905 /* for consistency */
1906 #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1909 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1910 * address falls in a hole. In that case the index of one of the memslots
1911 * bordering the hole is returned.
1913 static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1915 int start = 0, end = slots->used_slots;
1916 int slot = atomic_read(&slots->lru_slot);
1917 struct kvm_memory_slot *memslots = slots->memslots;
1919 if (gfn >= memslots[slot].base_gfn &&
1920 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1923 while (start < end) {
1924 slot = start + (end - start) / 2;
1926 if (gfn >= memslots[slot].base_gfn)
1932 if (gfn >= memslots[start].base_gfn &&
1933 gfn < memslots[start].base_gfn + memslots[start].npages) {
1934 atomic_set(&slots->lru_slot, start);
1940 static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1941 u8 *res, unsigned long bufsize)
1943 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1946 while (args->count < bufsize) {
1947 hva = gfn_to_hva(kvm, cur_gfn);
1949 * We return an error if the first value was invalid, but we
1950 * return successfully if at least one value was copied.
1952 if (kvm_is_error_hva(hva))
1953 return args->count ? 0 : -EFAULT;
1954 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1956 res[args->count++] = (pgstev >> 24) & 0x43;
1963 static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1964 unsigned long cur_gfn)
1966 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1967 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1968 unsigned long ofs = cur_gfn - ms->base_gfn;
1970 if (ms->base_gfn + ms->npages <= cur_gfn) {
1972 /* If we are above the highest slot, wrap around */
1974 slotidx = slots->used_slots - 1;
1976 ms = slots->memslots + slotidx;
1979 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1980 while ((slotidx > 0) && (ofs >= ms->npages)) {
1982 ms = slots->memslots + slotidx;
1983 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1985 return ms->base_gfn + ofs;
1988 static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1989 u8 *res, unsigned long bufsize)
1991 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1992 struct kvm_memslots *slots = kvm_memslots(kvm);
1993 struct kvm_memory_slot *ms;
1995 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1996 ms = gfn_to_memslot(kvm, cur_gfn);
1998 args->start_gfn = cur_gfn;
2001 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
2002 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
2004 while (args->count < bufsize) {
2005 hva = gfn_to_hva(kvm, cur_gfn);
2006 if (kvm_is_error_hva(hva))
2008 /* Decrement only if we actually flipped the bit to 0 */
2009 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
2010 atomic64_dec(&kvm->arch.cmma_dirty_pages);
2011 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
2013 /* Save the value */
2014 res[args->count++] = (pgstev >> 24) & 0x43;
2015 /* If the next bit is too far away, stop. */
2016 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
2018 /* If we reached the previous "next", find the next one */
2019 if (cur_gfn == next_gfn)
2020 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
2021 /* Reached the end of memory or of the buffer, stop */
2022 if ((next_gfn >= mem_end) ||
2023 (next_gfn - args->start_gfn >= bufsize))
2026 /* Reached the end of the current memslot, take the next one. */
2027 if (cur_gfn - ms->base_gfn >= ms->npages) {
2028 ms = gfn_to_memslot(kvm, cur_gfn);
2037 * This function searches for the next page with dirty CMMA attributes, and
2038 * saves the attributes in the buffer up to either the end of the buffer or
2039 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
2040 * no trailing clean bytes are saved.
2041 * In case no dirty bits were found, or if CMMA was not enabled or used, the
2042 * output buffer will indicate 0 as length.
2044 static int kvm_s390_get_cmma_bits(struct kvm *kvm,
2045 struct kvm_s390_cmma_log *args)
2047 unsigned long bufsize;
2048 int srcu_idx, peek, ret;
2051 if (!kvm->arch.use_cmma)
2053 /* Invalid/unsupported flags were specified */
2054 if (args->flags & ~KVM_S390_CMMA_PEEK)
2056 /* Migration mode query, and we are not doing a migration */
2057 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
2058 if (!peek && !kvm->arch.migration_mode)
2060 /* CMMA is disabled or was not used, or the buffer has length zero */
2061 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
2062 if (!bufsize || !kvm->mm->context.uses_cmm) {
2063 memset(args, 0, sizeof(*args));
2066 /* We are not peeking, and there are no dirty pages */
2067 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
2068 memset(args, 0, sizeof(*args));
2072 values = vmalloc(bufsize);
2076 down_read(&kvm->mm->mmap_sem);
2077 srcu_idx = srcu_read_lock(&kvm->srcu);
2079 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
2081 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
2082 srcu_read_unlock(&kvm->srcu, srcu_idx);
2083 up_read(&kvm->mm->mmap_sem);
2085 if (kvm->arch.migration_mode)
2086 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
2088 args->remaining = 0;
2090 if (copy_to_user((void __user *)args->values, values, args->count))
2098 * This function sets the CMMA attributes for the given pages. If the input
2099 * buffer has zero length, no action is taken, otherwise the attributes are
2100 * set and the mm->context.uses_cmm flag is set.
2102 static int kvm_s390_set_cmma_bits(struct kvm *kvm,
2103 const struct kvm_s390_cmma_log *args)
2105 unsigned long hva, mask, pgstev, i;
2107 int srcu_idx, r = 0;
2111 if (!kvm->arch.use_cmma)
2113 /* invalid/unsupported flags */
2114 if (args->flags != 0)
2116 /* Enforce sane limit on memory allocation */
2117 if (args->count > KVM_S390_CMMA_SIZE_MAX)
2120 if (args->count == 0)
2123 bits = vmalloc(array_size(sizeof(*bits), args->count));
2127 r = copy_from_user(bits, (void __user *)args->values, args->count);
2133 down_read(&kvm->mm->mmap_sem);
2134 srcu_idx = srcu_read_lock(&kvm->srcu);
2135 for (i = 0; i < args->count; i++) {
2136 hva = gfn_to_hva(kvm, args->start_gfn + i);
2137 if (kvm_is_error_hva(hva)) {
2143 pgstev = pgstev << 24;
2144 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
2145 set_pgste_bits(kvm->mm, hva, mask, pgstev);
2147 srcu_read_unlock(&kvm->srcu, srcu_idx);
2148 up_read(&kvm->mm->mmap_sem);
2150 if (!kvm->mm->context.uses_cmm) {
2151 down_write(&kvm->mm->mmap_sem);
2152 kvm->mm->context.uses_cmm = 1;
2153 up_write(&kvm->mm->mmap_sem);
2160 long kvm_arch_vm_ioctl(struct file *filp,
2161 unsigned int ioctl, unsigned long arg)
2163 struct kvm *kvm = filp->private_data;
2164 void __user *argp = (void __user *)arg;
2165 struct kvm_device_attr attr;
2169 case KVM_S390_INTERRUPT: {
2170 struct kvm_s390_interrupt s390int;
2173 if (copy_from_user(&s390int, argp, sizeof(s390int)))
2175 r = kvm_s390_inject_vm(kvm, &s390int);
2178 case KVM_CREATE_IRQCHIP: {
2179 struct kvm_irq_routing_entry routing;
2182 if (kvm->arch.use_irqchip) {
2183 /* Set up dummy routing. */
2184 memset(&routing, 0, sizeof(routing));
2185 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
2189 case KVM_SET_DEVICE_ATTR: {
2191 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2193 r = kvm_s390_vm_set_attr(kvm, &attr);
2196 case KVM_GET_DEVICE_ATTR: {
2198 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2200 r = kvm_s390_vm_get_attr(kvm, &attr);
2203 case KVM_HAS_DEVICE_ATTR: {
2205 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2207 r = kvm_s390_vm_has_attr(kvm, &attr);
2210 case KVM_S390_GET_SKEYS: {
2211 struct kvm_s390_skeys args;
2214 if (copy_from_user(&args, argp,
2215 sizeof(struct kvm_s390_skeys)))
2217 r = kvm_s390_get_skeys(kvm, &args);
2220 case KVM_S390_SET_SKEYS: {
2221 struct kvm_s390_skeys args;
2224 if (copy_from_user(&args, argp,
2225 sizeof(struct kvm_s390_skeys)))
2227 r = kvm_s390_set_skeys(kvm, &args);
2230 case KVM_S390_GET_CMMA_BITS: {
2231 struct kvm_s390_cmma_log args;
2234 if (copy_from_user(&args, argp, sizeof(args)))
2236 mutex_lock(&kvm->slots_lock);
2237 r = kvm_s390_get_cmma_bits(kvm, &args);
2238 mutex_unlock(&kvm->slots_lock);
2240 r = copy_to_user(argp, &args, sizeof(args));
2246 case KVM_S390_SET_CMMA_BITS: {
2247 struct kvm_s390_cmma_log args;
2250 if (copy_from_user(&args, argp, sizeof(args)))
2252 mutex_lock(&kvm->slots_lock);
2253 r = kvm_s390_set_cmma_bits(kvm, &args);
2254 mutex_unlock(&kvm->slots_lock);
2264 static int kvm_s390_apxa_installed(void)
2266 struct ap_config_info info;
2268 if (ap_instructions_available()) {
2269 if (ap_qci(&info) == 0)
2277 * The format of the crypto control block (CRYCB) is specified in the 3 low
2278 * order bits of the CRYCB designation (CRYCBD) field as follows:
2279 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2280 * AP extended addressing (APXA) facility are installed.
2281 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2282 * Format 2: Both the APXA and MSAX3 facilities are installed
2284 static void kvm_s390_set_crycb_format(struct kvm *kvm)
2286 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2288 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2289 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2291 /* Check whether MSAX3 is installed */
2292 if (!test_kvm_facility(kvm, 76))
2295 if (kvm_s390_apxa_installed())
2296 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2298 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2301 void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
2302 unsigned long *aqm, unsigned long *adm)
2304 struct kvm_s390_crypto_cb *crycb = kvm->arch.crypto.crycb;
2306 mutex_lock(&kvm->lock);
2307 kvm_s390_vcpu_block_all(kvm);
2309 switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) {
2310 case CRYCB_FORMAT2: /* APCB1 use 256 bits */
2311 memcpy(crycb->apcb1.apm, apm, 32);
2312 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx %016lx %016lx %016lx",
2313 apm[0], apm[1], apm[2], apm[3]);
2314 memcpy(crycb->apcb1.aqm, aqm, 32);
2315 VM_EVENT(kvm, 3, "SET CRYCB: aqm %016lx %016lx %016lx %016lx",
2316 aqm[0], aqm[1], aqm[2], aqm[3]);
2317 memcpy(crycb->apcb1.adm, adm, 32);
2318 VM_EVENT(kvm, 3, "SET CRYCB: adm %016lx %016lx %016lx %016lx",
2319 adm[0], adm[1], adm[2], adm[3]);
2322 case CRYCB_FORMAT0: /* Fall through both use APCB0 */
2323 memcpy(crycb->apcb0.apm, apm, 8);
2324 memcpy(crycb->apcb0.aqm, aqm, 2);
2325 memcpy(crycb->apcb0.adm, adm, 2);
2326 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx aqm %04x adm %04x",
2327 apm[0], *((unsigned short *)aqm),
2328 *((unsigned short *)adm));
2330 default: /* Can not happen */
2334 /* recreate the shadow crycb for each vcpu */
2335 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
2336 kvm_s390_vcpu_unblock_all(kvm);
2337 mutex_unlock(&kvm->lock);
2339 EXPORT_SYMBOL_GPL(kvm_arch_crypto_set_masks);
2341 void kvm_arch_crypto_clear_masks(struct kvm *kvm)
2343 mutex_lock(&kvm->lock);
2344 kvm_s390_vcpu_block_all(kvm);
2346 memset(&kvm->arch.crypto.crycb->apcb0, 0,
2347 sizeof(kvm->arch.crypto.crycb->apcb0));
2348 memset(&kvm->arch.crypto.crycb->apcb1, 0,
2349 sizeof(kvm->arch.crypto.crycb->apcb1));
2351 VM_EVENT(kvm, 3, "%s", "CLR CRYCB:");
2352 /* recreate the shadow crycb for each vcpu */
2353 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
2354 kvm_s390_vcpu_unblock_all(kvm);
2355 mutex_unlock(&kvm->lock);
2357 EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
2359 static u64 kvm_s390_get_initial_cpuid(void)
2364 cpuid.version = 0xff;
2365 return *((u64 *) &cpuid);
2368 static void kvm_s390_crypto_init(struct kvm *kvm)
2370 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
2371 kvm_s390_set_crycb_format(kvm);
2373 if (!test_kvm_facility(kvm, 76))
2376 /* Enable AES/DEA protected key functions by default */
2377 kvm->arch.crypto.aes_kw = 1;
2378 kvm->arch.crypto.dea_kw = 1;
2379 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2380 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2381 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2382 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
2385 static void sca_dispose(struct kvm *kvm)
2387 if (kvm->arch.use_esca)
2388 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
2390 free_page((unsigned long)(kvm->arch.sca));
2391 kvm->arch.sca = NULL;
2394 int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
2396 gfp_t alloc_flags = GFP_KERNEL;
2398 char debug_name[16];
2399 static unsigned long sca_offset;
2402 #ifdef CONFIG_KVM_S390_UCONTROL
2403 if (type & ~KVM_VM_S390_UCONTROL)
2405 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2412 rc = s390_enable_sie();
2418 if (!sclp.has_64bscao)
2419 alloc_flags |= GFP_DMA;
2420 rwlock_init(&kvm->arch.sca_lock);
2421 /* start with basic SCA */
2422 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
2425 mutex_lock(&kvm_lock);
2427 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
2429 kvm->arch.sca = (struct bsca_block *)
2430 ((char *) kvm->arch.sca + sca_offset);
2431 mutex_unlock(&kvm_lock);
2433 sprintf(debug_name, "kvm-%u", current->pid);
2435 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
2439 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
2440 kvm->arch.sie_page2 =
2441 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2442 if (!kvm->arch.sie_page2)
2445 kvm->arch.sie_page2->kvm = kvm;
2446 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
2448 for (i = 0; i < kvm_s390_fac_size(); i++) {
2449 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2450 (kvm_s390_fac_base[i] |
2451 kvm_s390_fac_ext[i]);
2452 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2453 kvm_s390_fac_base[i];
2455 kvm->arch.model.subfuncs = kvm_s390_available_subfunc;
2457 /* we are always in czam mode - even on pre z14 machines */
2458 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2459 set_kvm_facility(kvm->arch.model.fac_list, 138);
2460 /* we emulate STHYI in kvm */
2461 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2462 set_kvm_facility(kvm->arch.model.fac_list, 74);
2463 if (MACHINE_HAS_TLB_GUEST) {
2464 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2465 set_kvm_facility(kvm->arch.model.fac_list, 147);
2468 if (css_general_characteristics.aiv && test_facility(65))
2469 set_kvm_facility(kvm->arch.model.fac_mask, 65);
2471 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
2472 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
2474 kvm_s390_crypto_init(kvm);
2476 mutex_init(&kvm->arch.float_int.ais_lock);
2477 spin_lock_init(&kvm->arch.float_int.lock);
2478 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2479 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
2480 init_waitqueue_head(&kvm->arch.ipte_wq);
2481 mutex_init(&kvm->arch.ipte_mutex);
2483 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
2484 VM_EVENT(kvm, 3, "vm created with type %lu", type);
2486 if (type & KVM_VM_S390_UCONTROL) {
2487 kvm->arch.gmap = NULL;
2488 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
2490 if (sclp.hamax == U64_MAX)
2491 kvm->arch.mem_limit = TASK_SIZE_MAX;
2493 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
2495 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
2496 if (!kvm->arch.gmap)
2498 kvm->arch.gmap->private = kvm;
2499 kvm->arch.gmap->pfault_enabled = 0;
2502 kvm->arch.use_pfmfi = sclp.has_pfmfi;
2503 kvm->arch.use_skf = sclp.has_skey;
2504 spin_lock_init(&kvm->arch.start_stop_lock);
2505 kvm_s390_vsie_init(kvm);
2506 kvm_s390_gisa_init(kvm);
2507 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
2511 free_page((unsigned long)kvm->arch.sie_page2);
2512 debug_unregister(kvm->arch.dbf);
2514 KVM_EVENT(3, "creation of vm failed: %d", rc);
2518 void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2520 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
2521 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
2522 kvm_s390_clear_local_irqs(vcpu);
2523 kvm_clear_async_pf_completion_queue(vcpu);
2524 if (!kvm_is_ucontrol(vcpu->kvm))
2527 if (kvm_is_ucontrol(vcpu->kvm))
2528 gmap_remove(vcpu->arch.gmap);
2530 if (vcpu->kvm->arch.use_cmma)
2531 kvm_s390_vcpu_unsetup_cmma(vcpu);
2532 free_page((unsigned long)(vcpu->arch.sie_block));
2534 kvm_vcpu_uninit(vcpu);
2535 kmem_cache_free(kvm_vcpu_cache, vcpu);
2538 static void kvm_free_vcpus(struct kvm *kvm)
2541 struct kvm_vcpu *vcpu;
2543 kvm_for_each_vcpu(i, vcpu, kvm)
2544 kvm_arch_vcpu_destroy(vcpu);
2546 mutex_lock(&kvm->lock);
2547 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2548 kvm->vcpus[i] = NULL;
2550 atomic_set(&kvm->online_vcpus, 0);
2551 mutex_unlock(&kvm->lock);
2554 void kvm_arch_destroy_vm(struct kvm *kvm)
2556 kvm_free_vcpus(kvm);
2558 debug_unregister(kvm->arch.dbf);
2559 kvm_s390_gisa_destroy(kvm);
2560 free_page((unsigned long)kvm->arch.sie_page2);
2561 if (!kvm_is_ucontrol(kvm))
2562 gmap_remove(kvm->arch.gmap);
2563 kvm_s390_destroy_adapters(kvm);
2564 kvm_s390_clear_float_irqs(kvm);
2565 kvm_s390_vsie_destroy(kvm);
2566 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
2569 /* Section: vcpu related */
2570 static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2572 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
2573 if (!vcpu->arch.gmap)
2575 vcpu->arch.gmap->private = vcpu->kvm;
2580 static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2582 if (!kvm_s390_use_sca_entries())
2584 read_lock(&vcpu->kvm->arch.sca_lock);
2585 if (vcpu->kvm->arch.use_esca) {
2586 struct esca_block *sca = vcpu->kvm->arch.sca;
2588 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
2589 sca->cpu[vcpu->vcpu_id].sda = 0;
2591 struct bsca_block *sca = vcpu->kvm->arch.sca;
2593 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2594 sca->cpu[vcpu->vcpu_id].sda = 0;
2596 read_unlock(&vcpu->kvm->arch.sca_lock);
2599 static void sca_add_vcpu(struct kvm_vcpu *vcpu)
2601 if (!kvm_s390_use_sca_entries()) {
2602 struct bsca_block *sca = vcpu->kvm->arch.sca;
2604 /* we still need the basic sca for the ipte control */
2605 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2606 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2609 read_lock(&vcpu->kvm->arch.sca_lock);
2610 if (vcpu->kvm->arch.use_esca) {
2611 struct esca_block *sca = vcpu->kvm->arch.sca;
2613 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
2614 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2615 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
2616 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
2617 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
2619 struct bsca_block *sca = vcpu->kvm->arch.sca;
2621 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
2622 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2623 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2624 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2626 read_unlock(&vcpu->kvm->arch.sca_lock);
2629 /* Basic SCA to Extended SCA data copy routines */
2630 static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2633 d->sigp_ctrl.c = s->sigp_ctrl.c;
2634 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2637 static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2641 d->ipte_control = s->ipte_control;
2643 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2644 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2647 static int sca_switch_to_extended(struct kvm *kvm)
2649 struct bsca_block *old_sca = kvm->arch.sca;
2650 struct esca_block *new_sca;
2651 struct kvm_vcpu *vcpu;
2652 unsigned int vcpu_idx;
2655 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2659 scaoh = (u32)((u64)(new_sca) >> 32);
2660 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2662 kvm_s390_vcpu_block_all(kvm);
2663 write_lock(&kvm->arch.sca_lock);
2665 sca_copy_b_to_e(new_sca, old_sca);
2667 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2668 vcpu->arch.sie_block->scaoh = scaoh;
2669 vcpu->arch.sie_block->scaol = scaol;
2670 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
2672 kvm->arch.sca = new_sca;
2673 kvm->arch.use_esca = 1;
2675 write_unlock(&kvm->arch.sca_lock);
2676 kvm_s390_vcpu_unblock_all(kvm);
2678 free_page((unsigned long)old_sca);
2680 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2681 old_sca, kvm->arch.sca);
2685 static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2689 if (!kvm_s390_use_sca_entries()) {
2690 if (id < KVM_MAX_VCPUS)
2694 if (id < KVM_S390_BSCA_CPU_SLOTS)
2696 if (!sclp.has_esca || !sclp.has_64bscao)
2699 mutex_lock(&kvm->lock);
2700 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2701 mutex_unlock(&kvm->lock);
2703 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
2706 int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2711 /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2712 static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2714 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
2715 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2716 vcpu->arch.cputm_start = get_tod_clock_fast();
2717 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2720 /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2721 static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2723 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
2724 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2725 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2726 vcpu->arch.cputm_start = 0;
2727 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2730 /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2731 static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2733 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2734 vcpu->arch.cputm_enabled = true;
2735 __start_cpu_timer_accounting(vcpu);
2738 /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2739 static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2741 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2742 __stop_cpu_timer_accounting(vcpu);
2743 vcpu->arch.cputm_enabled = false;
2746 static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2748 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2749 __enable_cpu_timer_accounting(vcpu);
2753 static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2755 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2756 __disable_cpu_timer_accounting(vcpu);
2760 /* set the cpu timer - may only be called from the VCPU thread itself */
2761 void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2763 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2764 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2765 if (vcpu->arch.cputm_enabled)
2766 vcpu->arch.cputm_start = get_tod_clock_fast();
2767 vcpu->arch.sie_block->cputm = cputm;
2768 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2772 /* update and get the cpu timer - can also be called from other VCPU threads */
2773 __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2778 if (unlikely(!vcpu->arch.cputm_enabled))
2779 return vcpu->arch.sie_block->cputm;
2781 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2783 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2785 * If the writer would ever execute a read in the critical
2786 * section, e.g. in irq context, we have a deadlock.
2788 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2789 value = vcpu->arch.sie_block->cputm;
2790 /* if cputm_start is 0, accounting is being started/stopped */
2791 if (likely(vcpu->arch.cputm_start))
2792 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2793 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2798 void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2801 gmap_enable(vcpu->arch.enabled_gmap);
2802 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
2803 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2804 __start_cpu_timer_accounting(vcpu);
2808 void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2811 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2812 __stop_cpu_timer_accounting(vcpu);
2813 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
2814 vcpu->arch.enabled_gmap = gmap_get_enabled();
2815 gmap_disable(vcpu->arch.enabled_gmap);
2819 static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2821 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2822 vcpu->arch.sie_block->gpsw.mask = 0UL;
2823 vcpu->arch.sie_block->gpsw.addr = 0UL;
2824 kvm_s390_set_prefix(vcpu, 0);
2825 kvm_s390_set_cpu_timer(vcpu, 0);
2826 vcpu->arch.sie_block->ckc = 0UL;
2827 vcpu->arch.sie_block->todpr = 0;
2828 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
2829 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2830 CR0_INTERRUPT_KEY_SUBMASK |
2831 CR0_MEASUREMENT_ALERT_SUBMASK;
2832 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2834 CR14_EXTERNAL_DAMAGE_SUBMASK;
2835 /* make sure the new fpc will be lazily loaded */
2837 current->thread.fpu.fpc = 0;
2838 vcpu->arch.sie_block->gbea = 1;
2839 vcpu->arch.sie_block->pp = 0;
2840 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
2841 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2842 kvm_clear_async_pf_completion_queue(vcpu);
2843 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2844 kvm_s390_vcpu_stop(vcpu);
2845 kvm_s390_clear_local_irqs(vcpu);
2848 void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
2850 mutex_lock(&vcpu->kvm->lock);
2852 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
2853 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
2855 mutex_unlock(&vcpu->kvm->lock);
2856 if (!kvm_is_ucontrol(vcpu->kvm)) {
2857 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
2860 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2861 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
2862 /* make vcpu_load load the right gmap on the first trigger */
2863 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
2866 static bool kvm_has_pckmo_subfunc(struct kvm *kvm, unsigned long nr)
2868 if (test_bit_inv(nr, (unsigned long *)&kvm->arch.model.subfuncs.pckmo) &&
2869 test_bit_inv(nr, (unsigned long *)&kvm_s390_available_subfunc.pckmo))
2874 static bool kvm_has_pckmo_ecc(struct kvm *kvm)
2876 /* At least one ECC subfunction must be present */
2877 return kvm_has_pckmo_subfunc(kvm, 32) ||
2878 kvm_has_pckmo_subfunc(kvm, 33) ||
2879 kvm_has_pckmo_subfunc(kvm, 34) ||
2880 kvm_has_pckmo_subfunc(kvm, 40) ||
2881 kvm_has_pckmo_subfunc(kvm, 41);
2885 static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2888 * If the AP instructions are not being interpreted and the MSAX3
2889 * facility is not configured for the guest, there is nothing to set up.
2891 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
2894 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
2895 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
2896 vcpu->arch.sie_block->eca &= ~ECA_APIE;
2897 vcpu->arch.sie_block->ecd &= ~ECD_ECC;
2899 if (vcpu->kvm->arch.crypto.apie)
2900 vcpu->arch.sie_block->eca |= ECA_APIE;
2902 /* Set up protected key support */
2903 if (vcpu->kvm->arch.crypto.aes_kw) {
2904 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2905 /* ecc is also wrapped with AES key */
2906 if (kvm_has_pckmo_ecc(vcpu->kvm))
2907 vcpu->arch.sie_block->ecd |= ECD_ECC;
2910 if (vcpu->kvm->arch.crypto.dea_kw)
2911 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
2914 void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2916 free_page(vcpu->arch.sie_block->cbrlo);
2917 vcpu->arch.sie_block->cbrlo = 0;
2920 int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2922 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2923 if (!vcpu->arch.sie_block->cbrlo)
2928 static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2930 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2932 vcpu->arch.sie_block->ibc = model->ibc;
2933 if (test_kvm_facility(vcpu->kvm, 7))
2934 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
2937 int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2941 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2945 if (test_kvm_facility(vcpu->kvm, 78))
2946 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
2947 else if (test_kvm_facility(vcpu->kvm, 8))
2948 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
2950 kvm_s390_vcpu_setup_model(vcpu);
2952 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2953 if (MACHINE_HAS_ESOP)
2954 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
2955 if (test_kvm_facility(vcpu->kvm, 9))
2956 vcpu->arch.sie_block->ecb |= ECB_SRSI;
2957 if (test_kvm_facility(vcpu->kvm, 73))
2958 vcpu->arch.sie_block->ecb |= ECB_TE;
2960 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
2961 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
2962 if (test_kvm_facility(vcpu->kvm, 130))
2963 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2964 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
2966 vcpu->arch.sie_block->eca |= ECA_CEI;
2968 vcpu->arch.sie_block->eca |= ECA_IB;
2970 vcpu->arch.sie_block->eca |= ECA_SII;
2971 if (sclp.has_sigpif)
2972 vcpu->arch.sie_block->eca |= ECA_SIGPI;
2973 if (test_kvm_facility(vcpu->kvm, 129)) {
2974 vcpu->arch.sie_block->eca |= ECA_VX;
2975 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
2977 if (test_kvm_facility(vcpu->kvm, 139))
2978 vcpu->arch.sie_block->ecd |= ECD_MEF;
2979 if (test_kvm_facility(vcpu->kvm, 156))
2980 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
2981 if (vcpu->arch.sie_block->gd) {
2982 vcpu->arch.sie_block->eca |= ECA_AIV;
2983 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2984 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2986 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
2988 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
2991 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
2993 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
2995 if (vcpu->kvm->arch.use_cmma) {
2996 rc = kvm_s390_vcpu_setup_cmma(vcpu);
3000 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
3001 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
3003 vcpu->arch.sie_block->hpid = HPID_KVM;
3005 kvm_s390_vcpu_crypto_setup(vcpu);
3010 int kvm_arch_vcpu_precreate(struct kvm *kvm, unsigned int id)
3012 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
3017 struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
3020 struct kvm_vcpu *vcpu;
3021 struct sie_page *sie_page;
3026 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
3030 rc = kvm_vcpu_init(vcpu, kvm, id);
3036 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
3037 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
3039 goto out_uninit_vcpu;
3041 vcpu->arch.sie_block = &sie_page->sie_block;
3042 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
3044 /* the real guest size will always be smaller than msl */
3045 vcpu->arch.sie_block->mso = 0;
3046 vcpu->arch.sie_block->msl = sclp.hamax;
3048 vcpu->arch.sie_block->icpua = id;
3049 spin_lock_init(&vcpu->arch.local_int.lock);
3050 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa_int.origin;
3051 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
3052 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
3053 seqcount_init(&vcpu->arch.cputm_seqcount);
3055 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
3056 kvm_clear_async_pf_completion_queue(vcpu);
3057 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
3063 kvm_s390_set_prefix(vcpu, 0);
3064 if (test_kvm_facility(vcpu->kvm, 64))
3065 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
3066 if (test_kvm_facility(vcpu->kvm, 82))
3067 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
3068 if (test_kvm_facility(vcpu->kvm, 133))
3069 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
3070 if (test_kvm_facility(vcpu->kvm, 156))
3071 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
3072 /* fprs can be synchronized via vrs, even if the guest has no vx. With
3073 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
3076 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
3078 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
3080 if (kvm_is_ucontrol(vcpu->kvm)) {
3081 rc = __kvm_ucontrol_vcpu_init(vcpu);
3083 goto out_free_sie_block;
3086 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
3087 vcpu->arch.sie_block);
3088 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
3092 free_page((unsigned long)(vcpu->arch.sie_block));
3094 kvm_vcpu_uninit(vcpu);
3096 kmem_cache_free(kvm_vcpu_cache, vcpu);
3101 int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
3103 return kvm_s390_vcpu_has_irq(vcpu, 0);
3106 bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
3108 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
3111 void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
3113 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
3117 void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
3119 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
3122 static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
3124 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
3128 bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
3130 return atomic_read(&vcpu->arch.sie_block->prog20) &
3131 (PROG_BLOCK_SIE | PROG_REQUEST);
3134 static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
3136 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
3140 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
3141 * If the CPU is not running (e.g. waiting as idle) the function will
3142 * return immediately. */
3143 void exit_sie(struct kvm_vcpu *vcpu)
3145 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
3146 kvm_s390_vsie_kick(vcpu);
3147 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
3151 /* Kick a guest cpu out of SIE to process a request synchronously */
3152 void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
3154 kvm_make_request(req, vcpu);
3155 kvm_s390_vcpu_request(vcpu);
3158 static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
3161 struct kvm *kvm = gmap->private;
3162 struct kvm_vcpu *vcpu;
3163 unsigned long prefix;
3166 if (gmap_is_shadow(gmap))
3168 if (start >= 1UL << 31)
3169 /* We are only interested in prefix pages */
3171 kvm_for_each_vcpu(i, vcpu, kvm) {
3172 /* match against both prefix pages */
3173 prefix = kvm_s390_get_prefix(vcpu);
3174 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
3175 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
3177 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
3182 bool kvm_arch_no_poll(struct kvm_vcpu *vcpu)
3184 /* do not poll with more than halt_poll_max_steal percent of steal time */
3185 if (S390_lowcore.avg_steal_timer * 100 / (TICK_USEC << 12) >=
3186 halt_poll_max_steal) {
3187 vcpu->stat.halt_no_poll_steal++;
3193 int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
3195 /* kvm common code refers to this, but never calls it */
3200 static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
3201 struct kvm_one_reg *reg)
3206 case KVM_REG_S390_TODPR:
3207 r = put_user(vcpu->arch.sie_block->todpr,
3208 (u32 __user *)reg->addr);
3210 case KVM_REG_S390_EPOCHDIFF:
3211 r = put_user(vcpu->arch.sie_block->epoch,
3212 (u64 __user *)reg->addr);
3214 case KVM_REG_S390_CPU_TIMER:
3215 r = put_user(kvm_s390_get_cpu_timer(vcpu),
3216 (u64 __user *)reg->addr);
3218 case KVM_REG_S390_CLOCK_COMP:
3219 r = put_user(vcpu->arch.sie_block->ckc,
3220 (u64 __user *)reg->addr);
3222 case KVM_REG_S390_PFTOKEN:
3223 r = put_user(vcpu->arch.pfault_token,
3224 (u64 __user *)reg->addr);
3226 case KVM_REG_S390_PFCOMPARE:
3227 r = put_user(vcpu->arch.pfault_compare,
3228 (u64 __user *)reg->addr);
3230 case KVM_REG_S390_PFSELECT:
3231 r = put_user(vcpu->arch.pfault_select,
3232 (u64 __user *)reg->addr);
3234 case KVM_REG_S390_PP:
3235 r = put_user(vcpu->arch.sie_block->pp,
3236 (u64 __user *)reg->addr);
3238 case KVM_REG_S390_GBEA:
3239 r = put_user(vcpu->arch.sie_block->gbea,
3240 (u64 __user *)reg->addr);
3249 static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
3250 struct kvm_one_reg *reg)
3256 case KVM_REG_S390_TODPR:
3257 r = get_user(vcpu->arch.sie_block->todpr,
3258 (u32 __user *)reg->addr);
3260 case KVM_REG_S390_EPOCHDIFF:
3261 r = get_user(vcpu->arch.sie_block->epoch,
3262 (u64 __user *)reg->addr);
3264 case KVM_REG_S390_CPU_TIMER:
3265 r = get_user(val, (u64 __user *)reg->addr);
3267 kvm_s390_set_cpu_timer(vcpu, val);
3269 case KVM_REG_S390_CLOCK_COMP:
3270 r = get_user(vcpu->arch.sie_block->ckc,
3271 (u64 __user *)reg->addr);
3273 case KVM_REG_S390_PFTOKEN:
3274 r = get_user(vcpu->arch.pfault_token,
3275 (u64 __user *)reg->addr);
3276 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3277 kvm_clear_async_pf_completion_queue(vcpu);
3279 case KVM_REG_S390_PFCOMPARE:
3280 r = get_user(vcpu->arch.pfault_compare,
3281 (u64 __user *)reg->addr);
3283 case KVM_REG_S390_PFSELECT:
3284 r = get_user(vcpu->arch.pfault_select,
3285 (u64 __user *)reg->addr);
3287 case KVM_REG_S390_PP:
3288 r = get_user(vcpu->arch.sie_block->pp,
3289 (u64 __user *)reg->addr);
3291 case KVM_REG_S390_GBEA:
3292 r = get_user(vcpu->arch.sie_block->gbea,
3293 (u64 __user *)reg->addr);
3302 static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
3304 kvm_s390_vcpu_initial_reset(vcpu);
3308 int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3311 memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs));
3316 int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3319 memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
3324 int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
3325 struct kvm_sregs *sregs)
3329 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
3330 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
3336 int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
3337 struct kvm_sregs *sregs)
3341 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
3342 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
3348 int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3354 if (test_fp_ctl(fpu->fpc)) {
3358 vcpu->run->s.regs.fpc = fpu->fpc;
3360 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3361 (freg_t *) fpu->fprs);
3363 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
3370 int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3374 /* make sure we have the latest values */
3377 convert_vx_to_fp((freg_t *) fpu->fprs,
3378 (__vector128 *) vcpu->run->s.regs.vrs);
3380 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
3381 fpu->fpc = vcpu->run->s.regs.fpc;
3387 static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3391 if (!is_vcpu_stopped(vcpu))
3394 vcpu->run->psw_mask = psw.mask;
3395 vcpu->run->psw_addr = psw.addr;
3400 int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3401 struct kvm_translation *tr)
3403 return -EINVAL; /* not implemented yet */
3406 #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3407 KVM_GUESTDBG_USE_HW_BP | \
3408 KVM_GUESTDBG_ENABLE)
3410 int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3411 struct kvm_guest_debug *dbg)
3417 vcpu->guest_debug = 0;
3418 kvm_s390_clear_bp_data(vcpu);
3420 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3424 if (!sclp.has_gpere) {
3429 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3430 vcpu->guest_debug = dbg->control;
3431 /* enforce guest PER */
3432 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
3434 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3435 rc = kvm_s390_import_bp_data(vcpu, dbg);
3437 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
3438 vcpu->arch.guestdbg.last_bp = 0;
3442 vcpu->guest_debug = 0;
3443 kvm_s390_clear_bp_data(vcpu);
3444 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
3452 int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3453 struct kvm_mp_state *mp_state)
3459 /* CHECK_STOP and LOAD are not supported yet */
3460 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3461 KVM_MP_STATE_OPERATING;
3467 int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3468 struct kvm_mp_state *mp_state)
3474 /* user space knows about this interface - let it control the state */
3475 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3477 switch (mp_state->mp_state) {
3478 case KVM_MP_STATE_STOPPED:
3479 kvm_s390_vcpu_stop(vcpu);
3481 case KVM_MP_STATE_OPERATING:
3482 kvm_s390_vcpu_start(vcpu);
3484 case KVM_MP_STATE_LOAD:
3485 case KVM_MP_STATE_CHECK_STOP:
3486 /* fall through - CHECK_STOP and LOAD are not supported yet */
3495 static bool ibs_enabled(struct kvm_vcpu *vcpu)
3497 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
3500 static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3503 kvm_s390_vcpu_request_handled(vcpu);
3504 if (!kvm_request_pending(vcpu))
3507 * We use MMU_RELOAD just to re-arm the ipte notifier for the
3508 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
3509 * This ensures that the ipte instruction for this request has
3510 * already finished. We might race against a second unmapper that
3511 * wants to set the blocking bit. Lets just retry the request loop.
3513 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
3515 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3516 kvm_s390_get_prefix(vcpu),
3517 PAGE_SIZE * 2, PROT_WRITE);
3519 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
3525 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3526 vcpu->arch.sie_block->ihcpu = 0xffff;
3530 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3531 if (!ibs_enabled(vcpu)) {
3532 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
3533 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
3538 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3539 if (ibs_enabled(vcpu)) {
3540 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
3541 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
3546 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3547 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3551 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3553 * Disable CMM virtualization; we will emulate the ESSA
3554 * instruction manually, in order to provide additional
3555 * functionalities needed for live migration.
3557 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3561 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3563 * Re-enable CMM virtualization if CMMA is available and
3564 * CMM has been used.
3566 if ((vcpu->kvm->arch.use_cmma) &&
3567 (vcpu->kvm->mm->context.uses_cmm))
3568 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3572 /* nothing to do, just clear the request */
3573 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
3574 /* we left the vsie handler, nothing to do, just clear the request */
3575 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
3580 void kvm_s390_set_tod_clock(struct kvm *kvm,
3581 const struct kvm_s390_vm_tod_clock *gtod)
3583 struct kvm_vcpu *vcpu;
3584 struct kvm_s390_tod_clock_ext htod;
3587 mutex_lock(&kvm->lock);
3590 get_tod_clock_ext((char *)&htod);
3592 kvm->arch.epoch = gtod->tod - htod.tod;
3594 if (test_kvm_facility(kvm, 139)) {
3595 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3596 if (kvm->arch.epoch > gtod->tod)
3597 kvm->arch.epdx -= 1;
3600 kvm_s390_vcpu_block_all(kvm);
3601 kvm_for_each_vcpu(i, vcpu, kvm) {
3602 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3603 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3606 kvm_s390_vcpu_unblock_all(kvm);
3608 mutex_unlock(&kvm->lock);
3612 * kvm_arch_fault_in_page - fault-in guest page if necessary
3613 * @vcpu: The corresponding virtual cpu
3614 * @gpa: Guest physical address
3615 * @writable: Whether the page should be writable or not
3617 * Make sure that a guest page has been faulted-in on the host.
3619 * Return: Zero on success, negative error code otherwise.
3621 long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
3623 return gmap_fault(vcpu->arch.gmap, gpa,
3624 writable ? FAULT_FLAG_WRITE : 0);
3627 static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3628 unsigned long token)
3630 struct kvm_s390_interrupt inti;
3631 struct kvm_s390_irq irq;
3634 irq.u.ext.ext_params2 = token;
3635 irq.type = KVM_S390_INT_PFAULT_INIT;
3636 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
3638 inti.type = KVM_S390_INT_PFAULT_DONE;
3639 inti.parm64 = token;
3640 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3644 void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3645 struct kvm_async_pf *work)
3647 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3648 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3651 void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3652 struct kvm_async_pf *work)
3654 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3655 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3658 void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3659 struct kvm_async_pf *work)
3661 /* s390 will always inject the page directly */
3664 bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3667 * s390 will always inject the page directly,
3668 * but we still want check_async_completion to cleanup
3673 static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3676 struct kvm_arch_async_pf arch;
3679 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3681 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3682 vcpu->arch.pfault_compare)
3684 if (psw_extint_disabled(vcpu))
3686 if (kvm_s390_vcpu_has_irq(vcpu, 0))
3688 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
3690 if (!vcpu->arch.gmap->pfault_enabled)
3693 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3694 hva += current->thread.gmap_addr & ~PAGE_MASK;
3695 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
3698 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3702 static int vcpu_pre_run(struct kvm_vcpu *vcpu)
3707 * On s390 notifications for arriving pages will be delivered directly
3708 * to the guest but the house keeping for completed pfaults is
3709 * handled outside the worker.
3711 kvm_check_async_pf_completion(vcpu);
3713 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3714 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
3719 if (test_cpu_flag(CIF_MCCK_PENDING))
3722 if (!kvm_is_ucontrol(vcpu->kvm)) {
3723 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3728 rc = kvm_s390_handle_requests(vcpu);
3732 if (guestdbg_enabled(vcpu)) {
3733 kvm_s390_backup_guest_per_regs(vcpu);
3734 kvm_s390_patch_guest_per_regs(vcpu);
3737 clear_bit(vcpu->vcpu_id, vcpu->kvm->arch.gisa_int.kicked_mask);
3739 vcpu->arch.sie_block->icptcode = 0;
3740 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3741 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3742 trace_kvm_s390_sie_enter(vcpu, cpuflags);
3747 static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3749 struct kvm_s390_pgm_info pgm_info = {
3750 .code = PGM_ADDRESSING,
3755 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3756 trace_kvm_s390_sie_fault(vcpu);
3759 * We want to inject an addressing exception, which is defined as a
3760 * suppressing or terminating exception. However, since we came here
3761 * by a DAT access exception, the PSW still points to the faulting
3762 * instruction since DAT exceptions are nullifying. So we've got
3763 * to look up the current opcode to get the length of the instruction
3764 * to be able to forward the PSW.
3766 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
3767 ilen = insn_length(opcode);
3771 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3772 * Forward by arbitrary ilc, injection will take care of
3773 * nullification if necessary.
3775 pgm_info = vcpu->arch.pgm;
3778 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3779 kvm_s390_forward_psw(vcpu, ilen);
3780 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
3783 static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3785 struct mcck_volatile_info *mcck_info;
3786 struct sie_page *sie_page;
3788 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3789 vcpu->arch.sie_block->icptcode);
3790 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3792 if (guestdbg_enabled(vcpu))
3793 kvm_s390_restore_guest_per_regs(vcpu);
3795 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3796 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
3798 if (exit_reason == -EINTR) {
3799 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3800 sie_page = container_of(vcpu->arch.sie_block,
3801 struct sie_page, sie_block);
3802 mcck_info = &sie_page->mcck_info;
3803 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3807 if (vcpu->arch.sie_block->icptcode > 0) {
3808 int rc = kvm_handle_sie_intercept(vcpu);
3810 if (rc != -EOPNOTSUPP)
3812 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3813 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3814 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3815 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3817 } else if (exit_reason != -EFAULT) {
3818 vcpu->stat.exit_null++;
3820 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3821 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3822 vcpu->run->s390_ucontrol.trans_exc_code =
3823 current->thread.gmap_addr;
3824 vcpu->run->s390_ucontrol.pgm_code = 0x10;
3826 } else if (current->thread.gmap_pfault) {
3827 trace_kvm_s390_major_guest_pfault(vcpu);
3828 current->thread.gmap_pfault = 0;
3829 if (kvm_arch_setup_async_pf(vcpu))
3831 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
3833 return vcpu_post_run_fault_in_sie(vcpu);
3836 static int __vcpu_run(struct kvm_vcpu *vcpu)
3838 int rc, exit_reason;
3841 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3842 * ning the guest), so that memslots (and other stuff) are protected
3844 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3847 rc = vcpu_pre_run(vcpu);
3851 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
3853 * As PF_VCPU will be used in fault handler, between
3854 * guest_enter and guest_exit should be no uaccess.
3856 local_irq_disable();
3857 guest_enter_irqoff();
3858 __disable_cpu_timer_accounting(vcpu);
3860 exit_reason = sie64a(vcpu->arch.sie_block,
3861 vcpu->run->s.regs.gprs);
3862 local_irq_disable();
3863 __enable_cpu_timer_accounting(vcpu);
3864 guest_exit_irqoff();
3866 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3868 rc = vcpu_post_run(vcpu, exit_reason);
3869 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
3871 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
3875 static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3877 struct runtime_instr_cb *riccb;
3880 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
3881 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
3882 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3883 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3884 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3885 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3886 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3887 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
3888 /* some control register changes require a tlb flush */
3889 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
3891 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
3892 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
3893 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3894 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3895 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3896 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3898 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3899 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3900 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3901 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
3902 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3903 kvm_clear_async_pf_completion_queue(vcpu);
3906 * If userspace sets the riccb (e.g. after migration) to a valid state,
3907 * we should enable RI here instead of doing the lazy enablement.
3909 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
3910 test_kvm_facility(vcpu->kvm, 64) &&
3912 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
3913 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
3914 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
3917 * If userspace sets the gscb (e.g. after migration) to non-zero,
3918 * we should enable GS here instead of doing the lazy enablement.
3920 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3921 test_kvm_facility(vcpu->kvm, 133) &&
3923 !vcpu->arch.gs_enabled) {
3924 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3925 vcpu->arch.sie_block->ecb |= ECB_GS;
3926 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3927 vcpu->arch.gs_enabled = 1;
3929 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3930 test_kvm_facility(vcpu->kvm, 82)) {
3931 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3932 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3934 save_access_regs(vcpu->arch.host_acrs);
3935 restore_access_regs(vcpu->run->s.regs.acrs);
3936 /* save host (userspace) fprs/vrs */
3938 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3939 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3941 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3943 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3944 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3945 if (test_fp_ctl(current->thread.fpu.fpc))
3946 /* User space provided an invalid FPC, let's clear it */
3947 current->thread.fpu.fpc = 0;
3948 if (MACHINE_HAS_GS) {
3950 __ctl_set_bit(2, 4);
3951 if (current->thread.gs_cb) {
3952 vcpu->arch.host_gscb = current->thread.gs_cb;
3953 save_gs_cb(vcpu->arch.host_gscb);
3955 if (vcpu->arch.gs_enabled) {
3956 current->thread.gs_cb = (struct gs_cb *)
3957 &vcpu->run->s.regs.gscb;
3958 restore_gs_cb(current->thread.gs_cb);
3962 /* SIE will load etoken directly from SDNX and therefore kvm_run */
3964 kvm_run->kvm_dirty_regs = 0;
3967 static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3969 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3970 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3971 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3972 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
3973 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
3974 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3975 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3976 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3977 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3978 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3979 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3980 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
3981 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
3982 save_access_regs(vcpu->run->s.regs.acrs);
3983 restore_access_regs(vcpu->arch.host_acrs);
3984 /* Save guest register state */
3986 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3987 /* Restore will be done lazily at return */
3988 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3989 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
3990 if (MACHINE_HAS_GS) {
3991 __ctl_set_bit(2, 4);
3992 if (vcpu->arch.gs_enabled)
3993 save_gs_cb(current->thread.gs_cb);
3995 current->thread.gs_cb = vcpu->arch.host_gscb;
3996 restore_gs_cb(vcpu->arch.host_gscb);
3998 if (!vcpu->arch.host_gscb)
3999 __ctl_clear_bit(2, 4);
4000 vcpu->arch.host_gscb = NULL;
4002 /* SIE will save etoken directly into SDNX and therefore kvm_run */
4005 int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
4009 if (kvm_run->immediate_exit)
4012 if (kvm_run->kvm_valid_regs & ~KVM_SYNC_S390_VALID_FIELDS ||
4013 kvm_run->kvm_dirty_regs & ~KVM_SYNC_S390_VALID_FIELDS)
4018 if (guestdbg_exit_pending(vcpu)) {
4019 kvm_s390_prepare_debug_exit(vcpu);
4024 kvm_sigset_activate(vcpu);
4026 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
4027 kvm_s390_vcpu_start(vcpu);
4028 } else if (is_vcpu_stopped(vcpu)) {
4029 pr_err_ratelimited("can't run stopped vcpu %d\n",
4035 sync_regs(vcpu, kvm_run);
4036 enable_cpu_timer_accounting(vcpu);
4039 rc = __vcpu_run(vcpu);
4041 if (signal_pending(current) && !rc) {
4042 kvm_run->exit_reason = KVM_EXIT_INTR;
4046 if (guestdbg_exit_pending(vcpu) && !rc) {
4047 kvm_s390_prepare_debug_exit(vcpu);
4051 if (rc == -EREMOTE) {
4052 /* userspace support is needed, kvm_run has been prepared */
4056 disable_cpu_timer_accounting(vcpu);
4057 store_regs(vcpu, kvm_run);
4059 kvm_sigset_deactivate(vcpu);
4061 vcpu->stat.exit_userspace++;
4068 * store status at address
4069 * we use have two special cases:
4070 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
4071 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
4073 int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
4075 unsigned char archmode = 1;
4076 freg_t fprs[NUM_FPRS];
4081 px = kvm_s390_get_prefix(vcpu);
4082 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
4083 if (write_guest_abs(vcpu, 163, &archmode, 1))
4086 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
4087 if (write_guest_real(vcpu, 163, &archmode, 1))
4091 gpa -= __LC_FPREGS_SAVE_AREA;
4093 /* manually convert vector registers if necessary */
4094 if (MACHINE_HAS_VX) {
4095 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
4096 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
4099 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
4100 vcpu->run->s.regs.fprs, 128);
4102 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
4103 vcpu->run->s.regs.gprs, 128);
4104 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
4105 &vcpu->arch.sie_block->gpsw, 16);
4106 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
4108 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
4109 &vcpu->run->s.regs.fpc, 4);
4110 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
4111 &vcpu->arch.sie_block->todpr, 4);
4112 cputm = kvm_s390_get_cpu_timer(vcpu);
4113 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
4115 clkcomp = vcpu->arch.sie_block->ckc >> 8;
4116 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
4118 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
4119 &vcpu->run->s.regs.acrs, 64);
4120 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
4121 &vcpu->arch.sie_block->gcr, 128);
4122 return rc ? -EFAULT : 0;
4125 int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
4128 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
4129 * switch in the run ioctl. Let's update our copies before we save
4130 * it into the save area
4133 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
4134 save_access_regs(vcpu->run->s.regs.acrs);
4136 return kvm_s390_store_status_unloaded(vcpu, addr);
4139 static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4141 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
4142 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
4145 static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
4148 struct kvm_vcpu *vcpu;
4150 kvm_for_each_vcpu(i, vcpu, kvm) {
4151 __disable_ibs_on_vcpu(vcpu);
4155 static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4159 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
4160 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
4163 void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
4165 int i, online_vcpus, started_vcpus = 0;
4167 if (!is_vcpu_stopped(vcpu))
4170 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
4171 /* Only one cpu at a time may enter/leave the STOPPED state. */
4172 spin_lock(&vcpu->kvm->arch.start_stop_lock);
4173 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4175 for (i = 0; i < online_vcpus; i++) {
4176 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
4180 if (started_vcpus == 0) {
4181 /* we're the only active VCPU -> speed it up */
4182 __enable_ibs_on_vcpu(vcpu);
4183 } else if (started_vcpus == 1) {
4185 * As we are starting a second VCPU, we have to disable
4186 * the IBS facility on all VCPUs to remove potentially
4187 * oustanding ENABLE requests.
4189 __disable_ibs_on_all_vcpus(vcpu->kvm);
4192 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
4194 * Another VCPU might have used IBS while we were offline.
4195 * Let's play safe and flush the VCPU at startup.
4197 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
4198 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
4202 void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
4204 int i, online_vcpus, started_vcpus = 0;
4205 struct kvm_vcpu *started_vcpu = NULL;
4207 if (is_vcpu_stopped(vcpu))
4210 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
4211 /* Only one cpu at a time may enter/leave the STOPPED state. */
4212 spin_lock(&vcpu->kvm->arch.start_stop_lock);
4213 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4215 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
4216 kvm_s390_clear_stop_irq(vcpu);
4218 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
4219 __disable_ibs_on_vcpu(vcpu);
4221 for (i = 0; i < online_vcpus; i++) {
4222 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
4224 started_vcpu = vcpu->kvm->vcpus[i];
4228 if (started_vcpus == 1) {
4230 * As we only have one VCPU left, we want to enable the
4231 * IBS facility for that VCPU to speed it up.
4233 __enable_ibs_on_vcpu(started_vcpu);
4236 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
4240 static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
4241 struct kvm_enable_cap *cap)
4249 case KVM_CAP_S390_CSS_SUPPORT:
4250 if (!vcpu->kvm->arch.css_support) {
4251 vcpu->kvm->arch.css_support = 1;
4252 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
4253 trace_kvm_s390_enable_css(vcpu->kvm);
4264 static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
4265 struct kvm_s390_mem_op *mop)
4267 void __user *uaddr = (void __user *)mop->buf;
4268 void *tmpbuf = NULL;
4270 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
4271 | KVM_S390_MEMOP_F_CHECK_ONLY;
4273 if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size)
4276 if (mop->size > MEM_OP_MAX_SIZE)
4279 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
4280 tmpbuf = vmalloc(mop->size);
4285 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
4288 case KVM_S390_MEMOP_LOGICAL_READ:
4289 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
4290 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4291 mop->size, GACC_FETCH);
4294 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4296 if (copy_to_user(uaddr, tmpbuf, mop->size))
4300 case KVM_S390_MEMOP_LOGICAL_WRITE:
4301 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
4302 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4303 mop->size, GACC_STORE);
4306 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
4310 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4316 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
4318 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
4319 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
4325 long kvm_arch_vcpu_async_ioctl(struct file *filp,
4326 unsigned int ioctl, unsigned long arg)
4328 struct kvm_vcpu *vcpu = filp->private_data;
4329 void __user *argp = (void __user *)arg;
4332 case KVM_S390_IRQ: {
4333 struct kvm_s390_irq s390irq;
4335 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
4337 return kvm_s390_inject_vcpu(vcpu, &s390irq);
4339 case KVM_S390_INTERRUPT: {
4340 struct kvm_s390_interrupt s390int;
4341 struct kvm_s390_irq s390irq = {};
4343 if (copy_from_user(&s390int, argp, sizeof(s390int)))
4345 if (s390int_to_s390irq(&s390int, &s390irq))
4347 return kvm_s390_inject_vcpu(vcpu, &s390irq);
4350 return -ENOIOCTLCMD;
4353 long kvm_arch_vcpu_ioctl(struct file *filp,
4354 unsigned int ioctl, unsigned long arg)
4356 struct kvm_vcpu *vcpu = filp->private_data;
4357 void __user *argp = (void __user *)arg;
4364 case KVM_S390_STORE_STATUS:
4365 idx = srcu_read_lock(&vcpu->kvm->srcu);
4366 r = kvm_s390_vcpu_store_status(vcpu, arg);
4367 srcu_read_unlock(&vcpu->kvm->srcu, idx);
4369 case KVM_S390_SET_INITIAL_PSW: {
4373 if (copy_from_user(&psw, argp, sizeof(psw)))
4375 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4378 case KVM_S390_INITIAL_RESET:
4379 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4381 case KVM_SET_ONE_REG:
4382 case KVM_GET_ONE_REG: {
4383 struct kvm_one_reg reg;
4385 if (copy_from_user(®, argp, sizeof(reg)))
4387 if (ioctl == KVM_SET_ONE_REG)
4388 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®);
4390 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®);
4393 #ifdef CONFIG_KVM_S390_UCONTROL
4394 case KVM_S390_UCAS_MAP: {
4395 struct kvm_s390_ucas_mapping ucasmap;
4397 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4402 if (!kvm_is_ucontrol(vcpu->kvm)) {
4407 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4408 ucasmap.vcpu_addr, ucasmap.length);
4411 case KVM_S390_UCAS_UNMAP: {
4412 struct kvm_s390_ucas_mapping ucasmap;
4414 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4419 if (!kvm_is_ucontrol(vcpu->kvm)) {
4424 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4429 case KVM_S390_VCPU_FAULT: {
4430 r = gmap_fault(vcpu->arch.gmap, arg, 0);
4433 case KVM_ENABLE_CAP:
4435 struct kvm_enable_cap cap;
4437 if (copy_from_user(&cap, argp, sizeof(cap)))
4439 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4442 case KVM_S390_MEM_OP: {
4443 struct kvm_s390_mem_op mem_op;
4445 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4446 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4451 case KVM_S390_SET_IRQ_STATE: {
4452 struct kvm_s390_irq_state irq_state;
4455 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4457 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4458 irq_state.len == 0 ||
4459 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4463 /* do not use irq_state.flags, it will break old QEMUs */
4464 r = kvm_s390_set_irq_state(vcpu,
4465 (void __user *) irq_state.buf,
4469 case KVM_S390_GET_IRQ_STATE: {
4470 struct kvm_s390_irq_state irq_state;
4473 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4475 if (irq_state.len == 0) {
4479 /* do not use irq_state.flags, it will break old QEMUs */
4480 r = kvm_s390_get_irq_state(vcpu,
4481 (__u8 __user *) irq_state.buf,
4493 vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
4495 #ifdef CONFIG_KVM_S390_UCONTROL
4496 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4497 && (kvm_is_ucontrol(vcpu->kvm))) {
4498 vmf->page = virt_to_page(vcpu->arch.sie_block);
4499 get_page(vmf->page);
4503 return VM_FAULT_SIGBUS;
4506 int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4507 unsigned long npages)
4512 /* Section: memory related */
4513 int kvm_arch_prepare_memory_region(struct kvm *kvm,
4514 struct kvm_memory_slot *memslot,
4515 const struct kvm_userspace_memory_region *mem,
4516 enum kvm_mr_change change)
4518 /* A few sanity checks. We can have memory slots which have to be
4519 located/ended at a segment boundary (1MB). The memory in userland is
4520 ok to be fragmented into various different vmas. It is okay to mmap()
4521 and munmap() stuff in this slot after doing this call at any time */
4523 if (mem->userspace_addr & 0xffffful)
4526 if (mem->memory_size & 0xffffful)
4529 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4535 void kvm_arch_commit_memory_region(struct kvm *kvm,
4536 const struct kvm_userspace_memory_region *mem,
4537 const struct kvm_memory_slot *old,
4538 const struct kvm_memory_slot *new,
4539 enum kvm_mr_change change)
4545 rc = gmap_unmap_segment(kvm->arch.gmap, old->base_gfn * PAGE_SIZE,
4546 old->npages * PAGE_SIZE);
4549 rc = gmap_unmap_segment(kvm->arch.gmap, old->base_gfn * PAGE_SIZE,
4550 old->npages * PAGE_SIZE);
4555 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4556 mem->guest_phys_addr, mem->memory_size);
4558 case KVM_MR_FLAGS_ONLY:
4561 WARN(1, "Unknown KVM MR CHANGE: %d\n", change);
4564 pr_warn("failed to commit memory region\n");
4568 static inline unsigned long nonhyp_mask(int i)
4570 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4572 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4575 void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4577 vcpu->valid_wakeup = false;
4580 static int __init kvm_s390_init(void)
4584 if (!sclp.has_sief2) {
4585 pr_info("SIE is not available\n");
4589 if (nested && hpage) {
4590 pr_info("A KVM host that supports nesting cannot back its KVM guests with huge pages\n");
4594 for (i = 0; i < 16; i++)
4595 kvm_s390_fac_base[i] |=
4596 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4598 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
4601 static void __exit kvm_s390_exit(void)
4606 module_init(kvm_s390_init);
4607 module_exit(kvm_s390_exit);
4610 * Enable autoloading of the kvm module.
4611 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4612 * since x86 takes a different approach.
4614 #include <linux/miscdevice.h>
4615 MODULE_ALIAS_MISCDEV(KVM_MINOR);
4616 MODULE_ALIAS("devname:kvm");